A Survey of Robust Federated Adversarial Training: Expanded Threat Model, Design Perspectives, and Evaluation Guidelines
Suchul Lee, Journal of Internet Computing and Services, Vol. 27, No. 1, pp. 67-78, Feb. 2026
Keywords: Federated learning, Federated Adversarial Training, Non-IID, Byzantine-robust Aggregation, Differential privacy
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Lee, S. (2026). A Survey of Robust Federated Adversarial Training: Expanded Threat Model, Design Perspectives, and Evaluation Guidelines. Journal of Internet Computing and Services, 27(1), 67-78. DOI: 10.7472/jksii.2026.27.1.67.
[IEEE Style]
S. Lee, "A Survey of Robust Federated Adversarial Training: Expanded Threat Model, Design Perspectives, and Evaluation Guidelines," Journal of Internet Computing and Services, vol. 27, no. 1, pp. 67-78, 2026. DOI: 10.7472/jksii.2026.27.1.67.
[ACM Style]
Suchul Lee. 2026. A Survey of Robust Federated Adversarial Training: Expanded Threat Model, Design Perspectives, and Evaluation Guidelines. Journal of Internet Computing and Services, 27, 1, (2026), 67-78. DOI: 10.7472/jksii.2026.27.1.67.

