{"id":"https://openalex.org/W4395065889","doi":"https://doi.org/10.48550/arxiv.2404.14389","title":"Poisoning Attacks on Federated Learning-based Wireless Traffic Prediction","display_name":"Poisoning Attacks on Federated Learning-based Wireless Traffic Prediction","publication_year":2024,"publication_date":"2024-04-22","ids":{"openalex":"https://openalex.org/W4395065889","doi":"https://doi.org/10.48550/arxiv.2404.14389"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2404.14389","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2404.14389","pdf_url":"https://arxiv.org/pdf/2404.14389","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2404.14389","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101963062","display_name":"Zifan Zhang","orcid":"https://orcid.org/0000-0003-2268-9876"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhang, Zifan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056811906","display_name":"Minghong Fang","orcid":"https://orcid.org/0000-0002-1365-3911"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fang, Minghong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101853822","display_name":"Jiayuan Huang","orcid":"https://orcid.org/0009-0009-1610-9311"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Huang, Jiayuan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100373044","display_name":"Yuchen Liu","orcid":"https://orcid.org/0000-0001-7505-9718"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Yuchen","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101963062"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9740999937057495,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6359235048294067},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5736408233642578},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5490175485610962},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5316325426101685},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4352347254753113},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21988749504089355},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.19027328491210938}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6359235048294067},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5736408233642578},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5490175485610962},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5316325426101685},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4352347254753113},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21988749504089355},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.19027328491210938}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2404.14389","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2404.14389","pdf_url":"https://arxiv.org/pdf/2404.14389","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2404.14389","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2404.14389","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2404.14389","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2404.14389","pdf_url":"https://arxiv.org/pdf/2404.14389","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4395065889.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4298221930","https://openalex.org/W2390279801","https://openalex.org/W2777914285","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W3013363440","https://openalex.org/W4287823391"],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"offers":[3],"a":[4,9,39,93,118,135],"distributed":[5,77],"framework":[6],"to":[7,101],"train":[8],"global":[10],"control":[11],"model":[12,130],"across":[13],"multiple":[14],"base":[15],"stations":[16],"without":[17],"compromising":[18],"the":[19,53,72,103],"privacy":[20],"of":[21,55,75],"their":[22],"local":[23],"network":[24,44],"data.":[25],"This":[26],"makes":[27],"it":[28],"ideal":[29],"for":[30],"applications":[31],"like":[32],"wireless":[33,78,152],"traffic":[34,48,96,110,153],"prediction":[35],"(WTP),":[36],"which":[37,126],"plays":[38],"crucial":[40],"role":[41],"in":[42,81,143],"optimizing":[43],"resources,":[45],"enabling":[46],"proactive":[47],"flow":[49],"management,":[50],"and":[51,65,160],"enhancing":[52],"reliability":[54],"downstream":[56],"communication-aided":[57],"applications,":[58],"such":[59],"as":[60],"IoT":[61],"devices,":[62],"autonomous":[63],"vehicles,":[64],"industrial":[66],"automation":[67],"systems.":[68],"Despite":[69],"its":[70],"promise,":[71],"security":[73],"aspects":[74],"FL-based":[76,104],"systems,":[79],"particularly":[80],"regression-based":[82],"WTP":[83,105],"problems,":[84],"remain":[85],"inadequately":[86],"investigated.":[87],"In":[88],"this":[89],"paper,":[90],"we":[91],"introduce":[92],"novel":[94],"fake":[95],"injection":[97],"(FTI)":[98],"attack,":[99],"designed":[100],"undermine":[102],"system":[106],"by":[107],"injecting":[108],"fabricated":[109],"distributions":[111],"with":[112],"minimal":[113],"knowledge.":[114],"We":[115],"further":[116],"propose":[117],"defense":[119,161],"mechanism,":[120],"termed":[121],"global-local":[122],"inconsistency":[123],"detection":[124],"(GLID),":[125],"strategically":[127],"removes":[128],"abnormal":[129],"parameters":[131],"that":[132,156],"deviate":[133],"beyond":[134],"specific":[136],"percentile":[137],"range":[138],"estimated":[139],"through":[140],"statistical":[141],"methods":[142],"each":[144],"dimension.":[145],"Extensive":[146],"experimental":[147],"evaluations,":[148],"performed":[149],"on":[150],"real-world":[151],"datasets,":[154],"demonstrate":[155],"both":[157],"our":[158],"attack":[159],"strategies":[162],"significantly":[163],"outperform":[164],"existing":[165],"baselines.":[166]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
