iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1109/ACSSC.2015.7421145
{"id":"https://openalex.org/W2292373418","doi":"https://doi.org/10.1109/acssc.2015.7421145","title":"Detection of data injection attacks in decentralized learning","display_name":"Detection of data injection attacks in decentralized learning","publication_year":2015,"publication_date":"2015-11-01","ids":{"openalex":"https://openalex.org/W2292373418","doi":"https://doi.org/10.1109/acssc.2015.7421145","mag":"2292373418"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/acssc.2015.7421145","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029689658","display_name":"Reinhard Gentz","orcid":"https://orcid.org/0000-0002-7107-3448"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Reinhard Gentz","raw_affiliation_strings":["School of ECEE, Arizona State Univ., Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"School of ECEE, Arizona State Univ., Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055166851","display_name":"Hoi-To Wai","orcid":"https://orcid.org/0000-0003-4796-4483"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hoi-To Wai","raw_affiliation_strings":["School of ECEE, Arizona State Univ., Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"School of ECEE, Arizona State Univ., Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029881017","display_name":"Anna Scaglione","orcid":"https://orcid.org/0000-0002-8892-3680"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anna Scaglione","raw_affiliation_strings":["School of ECEE, Arizona State Univ., Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"School of ECEE, Arizona State Univ., Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019966334","display_name":"Amir Leshem","orcid":"https://orcid.org/0000-0002-2265-7463"},"institutions":[{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Amir Leshem","raw_affiliation_strings":["Faculty of Engr., Bar-Ilan Univ., Ramat-Gan, Israel"],"affiliations":[{"raw_affiliation_string":"Faculty of Engr., Bar-Ilan Univ., Ramat-Gan, Israel","institution_ids":["https://openalex.org/I13955877"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.096,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":12,"citation_normalized_percentile":{"value":0.878049,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":null,"issue":null,"first_page":"350","last_page":"354"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10249","display_name":"Distributed Multi-Agent Coordination and Control","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10249","display_name":"Distributed Multi-Agent Coordination and Control","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9918,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/distributed-optimization","display_name":"Distributed Optimization","score":0.560012},{"id":"https://openalex.org/keywords/attack-detection","display_name":"Attack Detection","score":0.559006},{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.553325},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.524594},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep Learning","score":0.509241},{"id":"https://openalex.org/keywords/gossip-protocol","display_name":"Gossip protocol","score":0.48023635}],"concepts":[{"id":"https://openalex.org/C62989814","wikidata":"https://www.wikidata.org/wiki/Q854648","display_name":"Gossip","level":2,"score":0.8680357},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81863415},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.57013994},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.551289},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.52601534},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.52143},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4868216},{"id":"https://openalex.org/C145928361","wikidata":"https://www.wikidata.org/wiki/Q5587504","display_name":"Gossip protocol","level":3,"score":0.48023635},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.46268192},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35762167},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2825663},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11872846},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10651526},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/acssc.2015.7421145","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.51}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W1488304144","https://openalex.org/W1547358136","https://openalex.org/W156419107","https://openalex.org/W1998692453","https://openalex.org/W2048402311","https://openalex.org/W2051187788","https://openalex.org/W2117905067","https://openalex.org/W2120286056","https://openalex.org/W2134616143","https://openalex.org/W2140372921","https://openalex.org/W2152967903","https://openalex.org/W2161305486","https://openalex.org/W3104550706","https://openalex.org/W3104849127","https://openalex.org/W3142330264","https://openalex.org/W4241413379","https://openalex.org/W4250134109"],"related_works":["https://openalex.org/W3216064821","https://openalex.org/W3024820515","https://openalex.org/W2149172033","https://openalex.org/W2131433923","https://openalex.org/W2120550887","https://openalex.org/W2108737453","https://openalex.org/W2020760577","https://openalex.org/W2010318438","https://openalex.org/W177242786","https://openalex.org/W1678654634"],"abstract_inverted_index":{"Gossip":[0],"based":[1],"optimization":[2],"and":[3,16,65,96],"learning":[4,12],"are":[5,21,32],"appealing":[6],"methods":[7,27],"that":[8,30],"solve":[9],"big":[10],"data":[11,20,48,56],"problems":[13],"sharing":[14],"computation":[15],"network":[17,64,77],"resources":[18],"when":[19],"distributed.":[22],"The":[23],"main":[24],"advantage":[25],"these":[26],"offer":[28],"is":[29],"they":[31],"fault":[33],"tolerant.":[34],"Their":[35],"flat":[36],"architecture,":[37],"however,":[38],"expands":[39],"the":[40,44,53,59,63,70],"attack":[41],"surface":[42],"in":[43,75],"case":[45,71],"of":[46,55,62,72,93],"a":[47,67,76,84,89],"injection":[49,57],"attack.":[50],"We":[51,86],"analyze":[52,97],"effects":[54],"on":[58],"asymptotic":[60],"behavior":[61],"draw":[66],"parallel":[68],"with":[69],"opinion":[73],"dynamics":[74],"where":[78],"zealots":[79],"inject":[80],"opinions":[81],"to":[82],"mislead":[83],"community.":[85],"further":[87],"propose":[88],"possible":[90],"decentralized":[91],"detection":[92],"such":[94],"attacks":[95],"its":[98],"performance.":[99]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2292373418","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2024-10-04T18:18:14.113223","created_date":"2016-06-24"}