Loading [MathJax]/jax/output/SVG/jax.js
Research article

Plant beneficial traits of endophytic bacteria associated with fennel (Foeniculum vulgare Mill.)

  • In this study, we used 16S rRNA gene sequence analysis to describe the diversity of cultivable endophytic bacteria associated with fennel (Foeniculum vulgare Mill.) and determined their plant-beneficial traits. The bacterial isolates from the roots of fennel belonged to four phyla: Firmicutes (BRN1 and BRN3), Proteobacteria (BRN5, BRN6, and BRN7), Gammaproteobacteria (BRN2), and Actinobacteria (BRN4). The bacterial isolates from the shoot of fennel represented the phyla Proteobacteria (BSN1, BSN2, BSN3, BSN5, BSN6, BSN7, and BSN8), Firmicutes (BSN4, BRN1, and BRN3), and Actinobacteria (BRN4). The bacterial species Bacillus megaterium, Bacillus aryabhattai, and Brevibacterium frigoritolerans were found both in the roots and shoots of fennel. The bacterial isolates were found to produce siderophores, HCN, and indole-3-acetic acid (IAA), as well as hydrolytic enzymes such as chitinase, protease, glucanase, and lipase. Seven bacterial isolates showed antagonistic activity against Fusarium culmorum, Fusarium solani, and Rhizoctonia. solani. Our findings show that medicinal plants with antibacterial activity may serve as a source for the selection of microorganisms that exhibit antagonistic activity against plant fungal infections and may be considered as a viable option for the management of fungal diseases. They can also serve as an active part of biopreparation, improving plant growth.

    Citation: Vyacheslav Shurigin, Li Li, Burak Alaylar, Dilfuza Egamberdieva, Yong-Hong Liu, Wen-Jun Li. Plant beneficial traits of endophytic bacteria associated with fennel (Foeniculum vulgare Mill.)[J]. AIMS Microbiology, 2024, 10(2): 449-467. doi: 10.3934/microbiol.2024022

    Related Papers:

    [1] Chunkai Zhang, Yingyang Chen, Ao Yin, Xuan Wang . Anomaly detection in ECG based on trend symbolic aggregate approximation. Mathematical Biosciences and Engineering, 2019, 16(4): 2154-2167. doi: 10.3934/mbe.2019105
    [2] Muhammad Firdaus, Siwan Noh, Zhuohao Qian, Harashta Tatimma Larasati, Kyung-Hyune Rhee . Personalized federated learning for heterogeneous data: A distributed edge clustering approach. Mathematical Biosciences and Engineering, 2023, 20(6): 10725-10740. doi: 10.3934/mbe.2023475
    [3] Kefeng Fan, Cun Xu, Xuguang Cao, Kaijie Jiao, Wei Mo . Tri-branch feature pyramid network based on federated particle swarm optimization for polyp segmentation. Mathematical Biosciences and Engineering, 2024, 21(1): 1610-1624. doi: 10.3934/mbe.2024070
    [4] Songfeng Liu, Jinyan Wang, Wenliang Zhang . Federated personalized random forest for human activity recognition. Mathematical Biosciences and Engineering, 2022, 19(1): 953-971. doi: 10.3934/mbe.2022044
    [5] M Kumaresan, M Senthil Kumar, Nehal Muthukumar . Analysis of mobility based COVID-19 epidemic model using Federated Multitask Learning. Mathematical Biosciences and Engineering, 2022, 19(10): 9983-10005. doi: 10.3934/mbe.2022466
    [6] Tao Wang, Min Qiu . A visual transformer-based smart textual extraction method for financial invoices. Mathematical Biosciences and Engineering, 2023, 20(10): 18630-18649. doi: 10.3934/mbe.2023826
    [7] Jiyang Yu, Baicheng Pan, Shanshan Yu, Man-Fai Leung . Robust capped norm dual hyper-graph regularized non-negative matrix tri-factorization. Mathematical Biosciences and Engineering, 2023, 20(7): 12486-12509. doi: 10.3934/mbe.2023556
    [8] Jianzhong Peng, Wei Zhu, Qiaokang Liang, Zhengwei Li, Maoying Lu, Wei Sun, Yaonan Wang . Defect detection in code characters with complex backgrounds based on BBE. Mathematical Biosciences and Engineering, 2021, 18(4): 3755-3780. doi: 10.3934/mbe.2021189
    [9] Shubashini Velu . An efficient, lightweight MobileNetV2-based fine-tuned model for COVID-19 detection using chest X-ray images. Mathematical Biosciences and Engineering, 2023, 20(5): 8400-8427. doi: 10.3934/mbe.2023368
    [10] Michael James Horry, Subrata Chakraborty, Biswajeet Pradhan, Maryam Fallahpoor, Hossein Chegeni, Manoranjan Paul . Factors determining generalization in deep learning models for scoring COVID-CT images. Mathematical Biosciences and Engineering, 2021, 18(6): 9264-9293. doi: 10.3934/mbe.2021456
  • In this study, we used 16S rRNA gene sequence analysis to describe the diversity of cultivable endophytic bacteria associated with fennel (Foeniculum vulgare Mill.) and determined their plant-beneficial traits. The bacterial isolates from the roots of fennel belonged to four phyla: Firmicutes (BRN1 and BRN3), Proteobacteria (BRN5, BRN6, and BRN7), Gammaproteobacteria (BRN2), and Actinobacteria (BRN4). The bacterial isolates from the shoot of fennel represented the phyla Proteobacteria (BSN1, BSN2, BSN3, BSN5, BSN6, BSN7, and BSN8), Firmicutes (BSN4, BRN1, and BRN3), and Actinobacteria (BRN4). The bacterial species Bacillus megaterium, Bacillus aryabhattai, and Brevibacterium frigoritolerans were found both in the roots and shoots of fennel. The bacterial isolates were found to produce siderophores, HCN, and indole-3-acetic acid (IAA), as well as hydrolytic enzymes such as chitinase, protease, glucanase, and lipase. Seven bacterial isolates showed antagonistic activity against Fusarium culmorum, Fusarium solani, and Rhizoctonia. solani. Our findings show that medicinal plants with antibacterial activity may serve as a source for the selection of microorganisms that exhibit antagonistic activity against plant fungal infections and may be considered as a viable option for the management of fungal diseases. They can also serve as an active part of biopreparation, improving plant growth.



    In recent years, the abundance of data generated from many distributed devices with the popularity of smartphones, wearable devices, intelligent home appliances, and autonomous driving. These data are usually concentrated in the data center for effective use. However, a crucial issue arises that the concentrated data store causes leakage of personal privacy [1]. Simultaneously, as the computing power of these mobile devices increases, it is attractive to store data locally while completing related computing tasks. Federated learning is a distributed machine learning framework that allows multiple parties to collaboratively train a model without sharing raw data [2,3], which has attracted significant attention from industry and academia recently. [4] summarizes and discusses in the application of federated learning in big data and its future direction. Although federated learning has essential significance and advantages in protecting user privacy, it also faces many challenges.

    First of all, due to the distributed nature of federated learning, it is vulnerable to Byzan- tine attacks. Notably, it has been shown that, with just one Byzantine client, the whole federated optimization algorithm can be compromised and fail to converge [5]. Especially when the training data is not independent and identically distributed (non-iid), the difficulty of defense against Byzantine attacks is increased and it is difficult to guarantee the convergence of the model [6].

    Methods for defending against Byzantine attacks in federated learning have been exten- sively studied, including coordinate-wise trimmed mean [9], the coordinate- wise median [7,8], the geometric median [10,11], and distance-based methods Krum [12], BREA [6], Bulyan [5]. In addition to the above methods based on statistical knowledge, [14] proposes a new idea based on anomaly detection to complete the detection of Byzantine clients in the learning process. [13] discusses the challenges and future directions of federated learning in real-time scenarios in terms of cybersecurity.

    The above methods can effectively defend against Byzantine attacks to some extent, but there are also some limitations. First, the methods based on statistical knowledge have high computational complexity, and also their defense abilities are weakened due to the non-iid data in federated learning. Second, for the anomaly detection algorithm [14], there is a premise that the detection model should be trained on the test data set. Obviously, the premise hypothesis cannot be realized in practical applications because it is difficult for us to get such a data set, which can cover almost all data distributions. Therefore, it necessary for the anomaly detection model to get pre-training without relying on test dataset and update dynamically on non-iid data.

    In this paper, we propose a new method that each client needs to share some data with the server, which makes a trade-off between client privacy and model performance. Unlike FedAvg [2], we use credibility score as the weight of model aggregation, not the sample size. The credibility score of each client is obtained by integrating the verification score and the detection score. The former is calculated by sharing data.

    The main contributions of this paper are:

    ▪ We propose a new federated learning framework (BRCA) which combines credibility assessment and unified update. BRCA not only effectively defends against Byzantine attacks, but also reduces the impact of non-iid data on the aggregated global model.

    ▪ The credibility assessment combing anomaly detection and data verification effectively detects Byzantine attacks on non-iid data.

    ▪ By incorporating an adaptive mechanism and transfer learning into the anomaly detection model, the anomaly detection model can dynamically improve detection performance. Moreover, its pre-training no longer relies on the test data set.

    ▪ We customize four different data distributions for each data set, and explore the influence of data distribution on defense methods against Byzantine attacks.

    FedAvg is firstly proposed in [2] as an aggregation algorithm for federated learning. The server updates the global model by a weighted average of the clients' model updates, and the aggregation weight is determined based on its data sample size. Stich [15] and Woodworth et al. [16] analyze the convergence of FedAvg on strongly-convex smooth loss functions. However, they assume that the data is iid, which is not suitable for federated learning [17,18]. And Li et al. [19] makes the first convergence analysis of FedAvg when the data is non-iid. [20] uses clustering to improve federated learning in non-iid data. Regrettably, the ability of naive FedAvg is very weak to resist Byzantine attacks.

    In the iterative process of federated aggregation, honest clients send the true model updates to the server, wishing to train a global model by consolidating their private data. However, Byzantine clients attempt to perturb the optimization process [21]. Byzantine attacks may be caused by some data corruption events in the computing or communication process such as software crashes, hardware failures and transmission errors. Simultaneously, they may also be caused by malicious clients through actively transmitting error information, in order to mislead the learning process [21].

    Byzantine-robust federated learning has received increasing attention in recent years. Krum [12] is designed specially to defend Byzantine attacks in the federated learning. Krum generate the global model by a client's model update whose distances to its neighbors is shortest. GeoMed [10] uses the geometric median which is a variant of the median from one dimension to multiple dimensions. Unlike the Krum, the GeoMed uses all client updates to generate a new global model, not just one client update. Trimmed Mean [9] proposes that each dimension of its global model is obtained by averaging the parameters of clients' model updates in that dimension. But before calculating the average, the largest and smallest part of the parameters in that dimension are deleted, Xie et al. [22] and Mhamdi et al. [5] are all its variants. BREA [6] also considers the security of information transmission, but its defense method is still based on distance calculation. Zero [23] based on Watermark detection approach detect attacks such as malware and phishing attacks and cryptojacking. [24] surveys intrusion detection techniques in mobile cloud computing environment.

    All of the above defense methods based on statistical knowledge and distance are not effective in defending against Byzantine attacks in non-iid settings. Abnormal [25] uses an anomaly detection model to complete the detection of Byzantine attacks.

    The concept of independent and identically distributed (iid) of data is clear, but there are many meanings of non-iid. In this work, we only consider label distribution skew [17]. The categories of samples may vary across clients. For example, in the face recognition task, each user generally has their face data; for mobile device, some users may use emojis that do not show up in others' devices.

    We summarize the contributions and limitations of the existing works in Table 1.

    Table 1.  The summary of the contributions and limitations of the related papers.
    Reference Contributions Limitations
    [12] [10] [9]
    [5] [22]
    Krum, GeoMed and Trimmed Mean complete the Byzantine defense based on statistical knowledge. Easy to deploy applications. The assumption is that the data of the clients is iid. High computational complexity.
    [25] The auto-encoder anomaly detection model is firstly applied to detect Byzantine attacks. The pre-training of the anomaly detection model is completed on test dataset. The anomaly detection model is static.
    [6] Cryptography is used to protect the security of information transmitted between clients and server. Defense against Byzantine attacks is still based on distance to find outliers, and had limited defenses capabilities.

     | Show Table
    DownLoad: CSV

    In this paper, we propose a method that combine credibility assessment and unified update to robust federated learning against Byzantine attacks on non-iid data.

    We utilize a federated setting that one server communicates with many clients. For the rest of the paper, we will use the following symbol definitions: A is the total client set, |A| = n; S is the selected client set in every iteration, |S| = k; among them, B is Byzantine client set, |B| = b, and H is honest client set, |H|=h. wti is the model update sent by the client i to the server at round t, Byzantine attack rate ξ=bkwt is the global model at round t, DP = {D, ..., Dn} is clients' private data, Ds = {Ds, ..., Ds } is the clients' shared data, and data-sharing rate γ = |Ds||DP|+|Ds| (|| represents the sample size of the data set).

    In order to enhance the robustness of federated learning against Byzantines attacks on non-iid data, BRCA combines credibility assessment and unified update, Figure 1 depicts the architecture of BRCA.

    Figure 1.  The frame diagram of the BRCA.

    Before training, each client needs to share some private data to the server. In each iteration, the server randomly selects some clients and sends the latest global model to them. These clients use their private data to train the model locally and send the model updates to the server. After receiving model updates, the server conducts a credibility assessment for each model update and calculates their credibility scores. Momentum is an effective measure to improve the ability of federated learning to resist Byzantine attacks [26]. So our aggregation Eq (1) is as follow:

    wt+1=αWt+(1a)isrtiwti (1)

    where rti is the credibility score of client i at round t and α (0 < α < 1) is a decay factor. Last, unified update uses shared data to update the primary global model to get the new global model for this round

    Algorithm 1 is the description of BRCA, which contains Credibility Assessment in line 22, and Unified Update in line 28. The crucial of BRCA to defend against Byzantine attacks is credibility assessment. On non-iid data, the data distributions of different clients are immense, and it is difficult to judge whether the difference is caused by Byzantine attacks or the non-iid data. However, the model update of the honest client should have a positive effect on its private data, which is not affected by other clients. Simultaneously, anomaly detection model can effectively detect Byzantine attacks [25]. Thus, we combine the above two ideas to detect Byzantine attacks. In order to solve the shortcomings of the existing anomaly detection models, we propose an adaptive anomaly detection model. In this paper, the shared data is randomly selected by each client based on the sample category. Of course, other sampling methods could also be used, such as clustering. In addition, it must be pointed out that the shared data will only be used on the server, not on the clients. That effectively protect the clients' privacy.

        Algorithm 1: BRCA
      Input: total clients A; total number of iterations T; learning rate ηserver, ηclient, ηdetection; Byzantine attack rate ξ; epoch Eserver, Eclient; initial global model w0; clients' private data DP={DP1,,DPN}; clients' shared data
    Ds = {Ds1, ..., DSn }; initial anomaly detection model θ0; β; α; d; k
      Output: global model WT+1, anomaly detection model θT+1
    1  R = : the credibility score set.
    2  H = : the honest client set.
    3  Function Add Attack(w):

     | Show Table
    DownLoad: CSV

    To summarize, BRCA has five steps. First: the server pre-train an anomaly detection model by source data and initialize a global model. Second: every client share little private data with the server. Three: every client download the newest global model from the server, and complete model updates by private data. Then, every client send the model update to the server. Four: the server update the global model and complete the adaptation of the anomaly detection model by model updates from clients. Five: the server update the primary global model with unified update, after that, the new global model is completed. Repeating steps three to five until the global model converges

    Our work is different from the recent state of the art. First, Krum, GeoMed and TrimmedMean are the representative methods based on geometric knowledge, but their premise is that the data of clients is dependent and identically distributed (iid). The hypothesis of our method is based on the actual application background of FL, aiming at non-iid data. Second, Abnormal is the first method to detect Byzantine attacks by auto-encoder anomaly detection model. However, the training of the anomaly detection model in the method is based on the test dataset and the abnormal detection model in the method is static. For both of the problems, our method has made improvement: 1) we pre-train the anomaly detection model with related but different source data without relying on the test dataset. 2) we introduce adaptive mechanism to the anomaly detection model, which help the detection model get update during federated iteration dynamically.

    Algorithm 2(Credibility Assessment) is the key part of BRCA, which assigns a credibility score for each client model update. A Byzantine client would be given much lower credibility score than an honest client. To guarantee the accuracy of the credibility score, Credibility Assessment integrates adaptive anomaly detection model and data verification.

        Algorithm 2: Credibility Assessment
      Input: local model updates Q; clients' shared data Ds={Ds1,,Dsn}; anomaly
    detection model θt; β; selected clients S; ηdetection; d; k
      Output: credibility score of clients R; honest client set H; anomaly detection model θt+1
    1  R = : credibility score set; H = : the honest client set; sum = 0; sume = 0; sumf = 0
    2  C = {Ct1,,Cti,Ctk}, client i S, cti is the weight of the last convolutional layer of Wti
    3  for each clienti S do

     | Show Table
    DownLoad: CSV

    In Algorithm 2, line 4 is the data verification, which calculates the verification score fi for the model update of client i. And line 5 is the get-anomaly-score() of the adaptive anomaly detection model, which calculates detection score ei. Subsequently, the credibility ri of the model update is ri = βei +(1β)fi, R={r1, ... ri..., rk}, client iS. The make-adaption () in line 24 implements the adaption of the anomaly detection model.

    In this paper, we judge the model update with a credibility score lower than the mean of R as a Byzantine attack, and set its credibility score as zero. Finally, normalizing the scores to get the final credibility scores.

    In the training process, we cannot predict the type of attacks, but we can estimate the model update of the honest client. Therefore, we can adopt a one-class classification algorithm to build the anomaly detection model with normal model updates. Such technique will learn the distribution boundary of the model updates to determine whether the new sample is abnormal. Auto-encoder is an effective one-class learning model for detecting anomalies, especially for high-dimensional data [27].

    In practical applications, we cannot get the target data to complete the pre-training of our anomaly detection model. Therefore, the initialized anomaly detection model will be pre-trained on the source data with the idea of transfer learning.

    At round t, the detection score eti of client i:

    eti=exp(Mse(Ctiθt(Cti))μ(E)σ(E))) (2)

    Our anomaly detection model is different from the one in Abnormal: 1) Abnormal uses the test set of the data set to train the anomaly detection model. Although the detection model obtained can complete the detection task very well, in most cases the test data set is not available. Therefore, based on the idea of transfer learning, we complete the pre-training of the anomaly detection model in the source domain. 2) Abnormal 's anomaly detection model will not be updated after training on the test set. We think this is unreasonable, because the test set is only a tiny part of the overall data. Using a small part of the training data to detect most of the remaining data, and the result may not be accurate enough. Therefore, pre-training of the anomaly detection model is completed in the source domain. Then we use the data of the target domain to fine-tune it in the iterative process to update the anomaly detection model dynamically, as make-adaption shown in Algorithm 3.

        Algorithm 3: AADM adaptive anomaly detection model
      Input: anomaly detection model θt; weights of the last convolutional layer of the local model C; ηdetection; credibility score R; honest client set H; d; k
      Output: updated anomaly detection model θt+1
    1  Function get-anomaly-score (θt,Cti):

     | Show Table
    DownLoad: CSV

    The non-iid of client data increases the difficulty of Byzantine defense. However, the performance of the updated model of each client on its shared data is not affected by other clients, which can be effectively solved this problem. Therefore, we use the clients' shared data {DS=Ds1,Dsi,,Dsk} client iS to calculate the verification score of their updated model:

    fti=(exp(ltiμ(l)σ(L)))2 (3)

    where lti is loss of client i calculated on model wti using the shared data Dsi at round t:

    lti=1|Dsi||Dsi|j=0l(Ds(j)i,Wti) (4)

    where Ds(j)i is the jth sample of Dsi and μ(L), σ(L) are the mean and variance of set L={l1,,lk} respectively.

    After getting the credibility score rkt in Algrithm 2 with the anomaly score ekt and the verification score fkt, we can complete the aggregation of the clients' local model updates in Eq (1) and get a preliminary updated global model. However, due to the non-iid of client data, the knowledge learned by the local model of each client is limited, and the model differences between two clients are also significant. Therefore, to solve the problem that the preliminary aggregation model lacks a clear and consistent goal, we introduce an additional unified update procedure with shared data on server, details can be seen in Algorithm 4.

      Algorithm 4: Unified update
      Input: global model wt+1; clients' shared data Ds = {Ds1,,Dsn}; Eserver; ηserver; honest client set H
      Output: global model wt+1.
    1 for each epoch e = 0 to Eserver do

     | Show Table
    DownLoad: CSV

    Because the data used for the unified update is composed of each client's data, it can more comprehensively cover the distribution of the overall data. The goal and direction of the unified update are based on the overall situation and will not tend to individual data distribution.

    To verify the effectiveness of BRCA, we structure the client's data into varying degrees of non-iid, and explore the impact of different amounts of shared data on the global model. At the same time, we also compare the performance of our anomaly detection model with the Abnormal 's and explore the necessity of unified update.

    Mnist and Cifar10 are the two most commonly used public data sets in image classification, and most of the benchmark methods in our work also use these two data sets for experiments. Using these two data sets, it is easier to compare with other existing methods.

    We do the experiments on Mnist and Cifar10, and customize four different data distributions: (a) non-iid-1: each client only has one class of data. (b) non-iid-2: each client has 2 classes of data. (c) non-iid-3: each client has 5 classes of data. (d) iid: each client has 10 classes of data.

    For Mnist, using 100 clients and four data distributions: (a) non-iid-1: each class of data in the training dataset is divided into 10 pieces, and each client selects one piece as its private data. (b) non-iid-2: each class of data in the training dataset is divided into 20 pieces, and each client selects 2 pieces of different classes of the data. (c) non-iid-3 each class of data in the training dataset is divided into 50 pieces, and each client selects 5 pieces of different classes of the data. (d) iid: each class of data in the training dataset is divided into 100 pieces, and each client selects 10 pieces of different classes of the data. As for the source domains used for the pre-training of the anomaly detection model, we randomly select 20,000 lowercase letters in the Nist dataset.

    For Cifar10, there are 10 clients and the configuration of four data distributions is similar to that of the Mnist. We select some classes of data in Cifar100 as source domain, which are as follows: lamp (number:40), lawn mower (41), lobster (45), man (46), forest (47), mountain (49), girl (35), Snake (78), Rose (70) and Tao (68), these samples do not exiting in Cifar10.

    We use logistic regression on Mnist dataset. ηserver = 0.1, ηclient = 0.1, ηdetection = 0.02, Eclient = 5, Eserver = 1, n = 100, k = 30, ξ = 20%. Two convolution layers and three fully connected layer on Cifar10, ηserver = 0.05, ηclient = 0.05, ηdetection = 0.002, Eclient = 10, Eserver = 10, n = 10, k = 10, ξ = 20%. The structure of models are the same as [10].

    Same-value attacks: A Byzantine client i sends the model update ωi = c1 to the server (1 is all-ones vectors, c is a constant), we set c = 5. Sign-flipping attacks: In this scenario, each client i computes its true model update ωi, then Byzantine clients send ωi = a ωi (a < 0) to the server, we set a = −5. Gaussian attacks: Byzantine clients add Gaussian noise to all the dimensions of the model update ωi = ωi +ϵ, where s follows Gaussian distribution N (0, g2) where g is the variance, we set g = 0.3.

    Defenses: Krum, GeoMed, Trimmed Mean, Abnormal and No Defense. No Defense does not use any defense methods.

    In the first experiment, we test the influence of the shared data rate γ in our algorithm, and do the experiment with the data distribution of non-iid-2. We implement it on five different values [1, 3, 5, 7 and 10%]. Figures 2 and 3 are the accuracy and loss for Cifar10. It is found that: 1) In all cases of Byzantine attacks, our algorithm is superior to the three benchmark methods. 2) Only 1% of the data shared by the client can significantly improve the performance of the global model. For three Byzantine attacks, Krum, GeoMed, Trimmed Mean, No Defense are all unable to converge. This also shows that when the model is complex, such methods would be less able to resist Byzantine attacks.

    Figure 2.  The Accuracy of Cifar10. Byzantine attack types from (a) to (c) are as follows: Same value, Sign flipping and Gaussian noisy. Six defense methods are adopted for each type of attack, in order: No defense, Krum, GeoMed, Trimmed Mean, Abnormal and BRCA. For Ours, there are five different shared data rate (1, 3, 5, 7 and 10%), which correspond accordingly: BRCA 1, BRCA 3, BRCA 5, BRCA 7, BRCA 10.
    Figure 3.  The loss of Cifar10. The legends are the same as Figure 2.

    With the increase in the client data sharing ratio, the performance of the global model has become lower. When the client shares the data ratio from 1 to 10%, the average growth rate with the three Byzantine attacks are: 1.8→1.41→0.97→0.92%. The clients only share one percent of the data, and the performance of the global model can be greatly improved.

    Figure 4 clearly demonstrates the impact of different shared data rates on the loss value of the global model on Cifar10.

    Figure 4.  The loss of BRCA on Cifar10 with five different shared rate.

    In this part, the purposes of our experiment are: 1) Compare anomaly detection model between ours and Abnormal. 2) Explore the robustness of the anomaly detection model to data that are non-iid. The shared data rate γ is 5%, Sections 4.2.3 and 4.2.4 are the same.

    In order to compare the detection performance of the anomaly detection model against Byzantine attacks between BRCA and Abnormal, we use the cross-entropy loss as the evaluation metric which is calculated by the detection score. Firstly, we get detection scores E={e1, ..., ei, ..., ek} based on model update ωi and θ, client i∈S. Then, we set P=Sigmoid(Eμ(E)) represents the probability that the client is honest and 1 − P is the probability that the client is Byzantine. Lastly, we use P and true label Y (yi = 0, i∈ B and yi = 1, j∈ H) to calculate the cross-entropy loss l=Σki=1yiln(Pi)

    Figure 5(a)(c) compare the loss of the anomaly detection model between BRCA and the Abnormal. From the figures, we can see that our model has a greater loss than Abnormal in the initial stage, mainly due to the pre-training of the anomaly detection model using the transfer learning. The initial pre-trained anomaly detection model cannot be used well in the target domain. As the adaptation progress, the loss of our model becomes decreases and gradually outperforms the Abnormal. Although Abnormal has a low loss in the initial stage, as the training progresses, the loss gradually increases, and the detection ability becomes degenerate.

    Figure 5.  the cross-entropy loss of our and Abnormal anomaly detection model, on Cifar10 with non-iid-2. (a)–(c) are the performance for three Byzantine-attacks.

    Figure 6(a)(c) show the influence of different data distributions on our detection model. For different data distributions, the detection ability of the model is different, but it is worth pointing out that: as the degree of non-iid of the data increases, the detection ability of the model also increases.

    Figure 6.  (a)–(c) are our anomaly detection model's performance on four different data distribution (iid, non-iid-1, non-iid-2, non-iid-3) against Byzantine attacks (Gaussian noisy, sign flipping, same value).

    In this part, we study the impact of the unified update on the global model. Figure 7 shows the accuracy of the global model with and without unified update on Cifar10.

    Figure 7.  The accuracy of BRCA and BRCA No on Cifar10. BRAC No is based on BRCA with unified update removed.

    From non-iid-1 to iid, the improvement of the global model's accuracy by unified update is as follows: 35.1→13.6→4.7→2.3% (Same value), 34.8→10.5→3.0→3.1% (Gaussian noisy), 24.9→9.9→2.8→3.0% (Sign flipping). Combined with Figure 7, it can be clearly found that the more simple the client data is, the more obvious the unified update will be to the improvement of the global model.

    When the data is non-iid, the directions of the model updates between clients are different. The higher the degree of non-iid of data, the more significant the difference. The global model obtained by weighted aggregation does not fit well with the global data. Unified update on the shared data can effectively integrate the model updates of multiple clients, giving the global model a consistent direction.

    Therefore, it is necessary to implement a unified update to the primary aggregation model when data is non-iid.

    Tables 2 and 3 show the accuracy and loss of each defense method under different data distributions on Cifar10. It can be seen that our method is the best, and the performance is relatively stable for different data distributions. The higher the degree of non-iid of data, the more single the data of each client, the lower the performance of the defense method.

    Table 2.  The accuracy of the six defenses under four different data distributions on Cifar10, against three attacks.
    Attacks No Krum GeoMed Abnormal TrimmedMean BRCA
    Same value Non-iid-1 0.1 0.1 0.1 0.178 0.1 0.529
    Non-iid-2 0.101 0.207 0.205 0.480 0.1 0.619
    Non-iid-3 0.1 0.398 0.398 0.634 0.1 0.691
    iid 0.098 0.696 0.705 0.698 0.101 0.713
    Gaussian noisy Non-iid-1 0.1 0.1 0.1 0.178 0.1 0.529
    Non-iid-2 0.191 0.204 0.205 0.513 0.059 0.623
    Non-iid-3 0.0409 0.398 0.394 0.660 0.171 0.692
    iid 0.1 0.697 0.694 0.710 0.120 0.715
    Sign flipping Non-iid-1 0.1 0.101 0.1 0.177 0.1 0.426
    Non-iid-2 0.1 0.192 0.214 0.5131 0.1 0.621
    Non-iid-3 0.1 0.397 0398 0.651 0.1 0.686
    iid 0.1 0.697 0.703 0.711 0.1 0.718

     | Show Table
    DownLoad: CSV
    Table 3.  The loss of the six defenses under four different data distributions on Cifar10, against three attacks.
    Attacks No Krum GeoMed Abnormal TrimmedMean BRCA
    Same value Non-iid-1 2.84e16 11.72 9.61 2.29 6.05e17 2.09
    Non-iid-2 6.99e16 7.29 8.01 2.06 3.63e16 2.09
    Non-iid-3 4.48e16 2.35 2.38 1.893 3.37e16 0.691
    iid 1.51e16 0.794 0.774 1.837 3.17e16 1.79
    Gaussian noisy Non-iid-1 8.635e4 8.41 9.37 2.29 936.17 1.54
    Non-iid-2 9.51 7.57 8.37 1.34 7.98 0.623
    Non-iid-3 8.22 2.01 2.31 0.94 6.07 0.692
    iid 8.09 0.81 0.79 0.82 3.12 0.76
    Sign flipping Non-iid-1 2.30 10.72 9.91 2.29 2.30 1.54
    Non-iid-2 2.31 7.77 7.10 1.34 2.30 0.621
    Non-iid-3 2.31 2.36 2.13 0.94 2.30 0.686
    iid 2.31 0.79 0.80 0.81 2.31 0.76

     | Show Table
    DownLoad: CSV

    Our analysis is as follows: 1) The non-iid of data among clients causes large differences between clients' models. And it is difficult for the defense method to judge whether the anomaly is caused by the non-iid of the data or by the Byzantine attacks, which increases the difficulty of defending the Byzantine attack. 2) Krum and GeoMed use statistical knowledge to select the median or individual client's model to represent the global model. This type of method can effectively defend against Byzantine attacks when the data is iid. However when the data is non-iid, each client's model only focuses on a smaller area, and its independence is high, cannot cover the domain of other clients, and obviously cannot represent the global model. 3) Trimmed Mean is based on the idea of averaging to defend against Byzantine attacks. When the parameter dimension of the model is low, it has a good performance. But as the complexity of the model increases, the method can not stably complete convergence.

    In this work, we propose a robust federated learning framework against Byzantine attacks when the data is non-iid. BRCA detects Byzantine attacks by credibility assessment. Meanwhile, it makes the unified updating of the global model on the shared data, so that the global model has a consistent direction and its performance is improved. BRCA can make the global model converge very well when facing different data distributions. And for the pre-training of anomaly detection models, transfer learning can help the anomaly detection model get rid of its dependence on the test data set. Experiments have proved that BRCA performs well both on non-iid and iid data, especially on non-iid data. In the future, we will improve our methods by studying how to protect the privacy and security of shared data.

    This work was partially supported by the Shanghai Science and Technology Innovation Action Plan under Grant 19511101300.

    All authors declare no conflicts of interest in this paper.


    Acknowledgments



    This research was supported by Xinjiang Uygur Autonomous Region regional coordinated innovation project (Shanghai cooperation organization science and technology partnership program) (Nos.: 2020E01047 and 2021E01018), National Natural Science Foundation of China (Nos.: 32050410306 and 32000084) and the Third Xinjiang Scientific Expedition Program (Grant No. 2022xjkk1204).

    Conflict of interest



    The authors declare no conflict of interest.

    Author contributions



    DE designed the experiment. VS and BA conducted the laboratory experiments. VS and LL analysed the results of experiments. DE, VS, and YHL wrote the manuscript. WJL revised the manuscript and made critical comments. All authors read and approved the manuscript.

    [1] Hui Xiang (2005) Flora of China. Tropicos Flora of China Checklist project 14: 134.
    [2] Ozbek H, Ugras S, Dulger H, et al. (2003) Hepatoprotective effect of Foeniculum vulgare essential oil. Fitoterapia 74: 317-319. https://doi.org/10.1016/s0367-326x(03)00028-5
    [3] Faudale M, Viladomat F, Bastida J, et al. (2008) Antioxidant activity and phenolic composition of wild, edible, and medicinal fennel from different mediterranean countries. J Agric Food Chem 56: 1912-1920. https://doi.org/10.1021/jf073083c
    [4] Mohsenzadeh M (2007) Evaluation of antibacterial activity of selected Iranian essential oils against Staphylococcus aureus and Escherichia coli in nutrient broth medium. Pak J Biol Sci 10: 3693-3697. https://doi.org/10.3923/pjbs.2007.3693.3697
    [5] Kaur GJ, Arora DS (2008) In-vitro antibacterial activity of three plants belonging to the family Umbelliferae. Int J Antimicrob Agents 31: 393-395. https://doi.org/10.1016/j.ijantimicag.2007.11.007
    [6] Abed KF (2007) Antimicrobial activity of essential oils of some medicinal plants from Saudi Arabia. Saudi J Biol Sci 14: 53-60.
    [7] Choi EM, Hwang JK (2004) Anti-inflammatory, analgesic and antioxidant activities of the fruit of Foeniculum vulgare. Fitoterapia 75: 557-565. https://doi.org/10.1016/j.fitote.2004.05.005
    [8] Tognolini M, Ballabeni V, Bertoni S, et al. (2007) Protective effect of Foeniculum vulgare essential oil and anethole in an experimental model of thrombosis. Pharmacol Res 56: 254-260. https://doi.org/10.1016/j.phrs.2007.07.002
    [9] El-Soud NA, El-Laithy N, El-Saeed G, et al. (2011) Antidiabetic activities of Foeniculum vulgare Mill. essential oil in streptozotocin induced diabetic rats. Macedonian J Med Sci 173: 1857-5773. https://doi.org/10.3889/MJMS.1857-5773.2011.0173
    [10] Pradhan M, Sribhuwaneswari S, Karthikeyan D, et al. (2008) In-vitro cytoprotection activity of Foeniculum vulgare and Helicteres isora in cultured human blood lymphocytes and antitumour activity against B16F10 melanoma cell line. Res J Pharm Technol 1: 450-452.
    [11] Reynolds JEF (1980) Essential oils and aromatic carminatives, Martindale-The Extra. Pharmacopeia, Royal Pharmaceutical Society, London .
    [12] Shaker GA, Alhamadany HS (2015) Isolation and identification of fungi which infect fennel Foeniculum vulgare Mill. and its impact as antifungal agent. Bulletin of the Iraq Natural History Museum 13: 31-38.
    [13] Cacciola SO, Pane A, Cooke DEL, et al. (2006) First report of brown rot and wilt of fennel caused by Phytophthora megasperma in Italy. Plant Dis 90: 110. https://doi.org/10.1094/PD-90-0110A
    [14] Choi IY, Kim JH, Kim BS, et al. (2016) First report of Sclerotinia stem rot of fennel caused by Sclerotinia sclerotiorum in Korea. Plant Dis 100: 223. https://doi.org/10.1094/PDIS-05-15-0512-PDN
    [15] D'Amico M, Frisullo S, Cirulli M (2008) Endophytic fungi occurring in fennel, lettuce, chicory, and celery-commercial crops in southern Italy. Mycol Res 112: 100-107. https://doi.org/10.1016/j.mycres.2007.11.007
    [16] Egamberdieva D, Wirth S, Behrendt U, et al. (2017a) Antimicrobial activity of medicinal plants correlates with the proportion of antagonistic endophytes. Front Microbiol 8: 199. https://doi.org/10.3389/fmicb.2017.00199
    [17] Egamberdieva D, Wirth S, Alqarawi AA, et al. (2017b) Phytohormones and beneficial microbes: Essential components for plants to balance stress and fitness. Front Microbiol 8: 2104. https://doi.org/10.3389/fmicb.2017.02104
    [18] Rezaei-Chiyaneh E, Battaglia ML, Sadeghpour A, et al. (2021) Optimizing intercropping systems of black cumin (Nigella sativa L.) and fenugreek (Trigonella foenum-graecum L.) through inoculation with bacteria and mycorrhizal fungi. Adv Sustainable Syst 5: 2000269. https://doi.org/10.1002/adsu.202000269
    [19] Pawlik M, Cania B, Thijs S, et al. (2017) Hydrocarbon degradation potential and plant growth-promoting activity of culturable endophytic bacteria of Lotus corniculatus and Oenothera biennis from a long-term polluted site. Environ Sci Pollut Res 24: 19640-19652. https://doi.org/10.1007/s11356-017-9496-1
    [20] Egamberdieva D, Shurigin V, Alaylar B, et al. (2020a) Bacterial endophytes from horseradish (Armoracia rusticana G. Gaertn., B. Mey. & Scherb.) with antimicrobial efficacy against pathogens. Plant Soil Environ 66: 309-316. https://doi.org/10.17221/137/2020-PSE
    [21] Egamberdieva D, Shurigin V, Alaylar B, et al. (2020b) The effect of biochars and endophytic bacteria on growth and root rot disease incidence of Fusarium infested narrow-leafed lupin (Lupinus angustifolius L.). Microorganisms 8: 496. https://doi.org/10.3390/microorganisms8040496
    [22] Nejatzadeh-Barandozi F (2013) Antibacterial activities and antioxidant capacity of Aloe vera. Bioorganic Med Chem Lett 3: 1-8. https://doi.org/10.1186/2191-2858-3-5
    [23] Bafana A, Lohiya R (2013) Diversity and metabolic potential of culturable root-associated bacteria from Origanum vulgare in sub-Himalayan region. World J Microbiol Biotechnol 29: 63-74. https://doi.org/10.1007/s11274-012-1158-3
    [24] Phetcharat P, Duangpaeng A (2012) Screening of endophytic bacteria from organic rice tissue for indole acetic acid production. Procedia Eng 32: 177-183. https://doi.org/10.1016/j.proeng.2012.01.1254
    [25] Shurigin V, Egamberdieva D, Samadiy S, et al. (2020) Endophytes from medicinal plants as biocontrol agents against Fusarium caused diseases. Mikrobiolohichnyi Zh 82: 41-52. https://doi.org/10.15407/microbiolj82.04.041
    [26] Shurigin V, Alikulov B, Davranov K, et al. (2022) Bacterial endophytes from halophyte black saxaul (Haloxylon aphyllum Minkw.) and their plant growth-promoting properties. J Appl Biol Biotech 10: 45-53. https://doi.org/10.7324/JABB.2021.100106
    [27] Koberl M, Ramadan EM, Adam M, et al. (2013) Bacillus and Streptomyces were selected as broad-spectrum antagonists against soilborne pathogens from arid areas in Egypt. FEMS Microbiol Lett 342: 168-178. https://doi.org/10.1111/1574-6968.12089
    [28] Katoch M, Pull S (2017) Endophytic fungi associated with Monarda citriodora, an aromatic and medicinal plant and their biocontrol potential. Pharm Biol 55: 1528-1535. https://doi.org/10.1080/13880209.2017.1309054
    [29] Tamilarasi S, Nanthakumar K, Karthikeyan K, et al. (2008) Diversity of root associated microorganisms of selected medicinal plants and influence of rhizomicroorganisms on the antimicrobial property of Coriandrum sativum. J Environ Biol 29: 127-134.
    [30] Salam N, Khieu TN, Liu MJ, et al. (2017) Endophytic actinobacteria associated with Dracaena cochinchinensis Lour.: isolation, diversity, and their cytotoxic activities. Biomed Res Int 1308563. https://doi.org/10.1155/2017/1308563
    [31] Rustamova N, Wubulikasimu A, Mukhamedov N, et al. (2020) Endophytic bacteria associated with medicinal plant Baccharoides anthelmintica diversity and characterization. Curr Microbiol 77: 1457-1465. https://doi.org/10.1007/s00284-020-01924-5
    [32] Shurigin V, Alaylar B, Davranov K, et al. (2021) Diversity and biological activity of culturable endophytic bacteria associated with marigold (Calendula officinalis L.). AIMS Microbiol 7: 336-353. https://doi.org/10.3934/microbiol.2021021
    [33] Mora-Ruiz MDR, Font-Verdera F, Díaz-Gil C, et al. (2015) Moderate halophilic bacteria colonizing the phylloplane of halophytes of the subfamily Salicornioideae (Amaranthaceae). Syst Appl Microbiol 38: 406-416. https://doi.org/10.1016/j.syapm.2015.05.004
    [34] Dashti AA, Jadaon MM, Abdulsamad AM, et al. (2009) Heat treatment of bacteria: a simple method of DNA extraction for molecular techniques. Kuwait Med J 41: 117-122.
    [35] Lane DJ (1991) 16S/23S rRNA Sequencing. Nucleic acid techniques in bacterial systematic. New York: John Wiley and Sons 115-175.
    [36] Jinneman KC, Wetherington JH, Adams AM, et al. (1996) Differentiation of Cyclospora sp. and Eimeria spp. by using the polymerase chain reaction amplification products and restriction fragment length polymorphisms. Food and Drug Administration Laboratory Information Bulletin LIB no 4044 .
    [37] Tamura K, Nei M, Kumar S (2004) Prospects for inferring very large phylogenies by using the neighbor-joining method. Proc Natl Acad Sci USA 101: 11030-11035. https://doi.org/10.1073/pnas.0404206101
    [38] Kumar S, Stecher G, Li M, et al. (2018) MEGA X: Molecular Evolutionary Genetics Analysis across computing platforms. Mol Biol Evol 35: 1547-1549. https://doi.org/10.1093/molbev/msy096
    [39] Egamberdieva D, Wirth SJ, Shurigin VV, et al. (2017d) Endophytic bacteria improve plant growth, symbiotic performance of chickpea (Cicer arietinum L.) and induce suppression of root rot caused by Fusarium solani under salt stress. Front Microbiol 8: 1887. https://doi.org/10.3389/fmicb.2017.01887
    [40] Castric PA (1975) Hydrogen cyanide, a secondary metabolite of Pseudomonas aeruginosa. Can J Microbiol 21: 613-618. https://doi.org/10.1139/m75-088
    [41] Schwyn B, Neilands JB (1987) Universal chemical assay for the detection and determination of siderophores. Anal Biochem 160: 47-56. https://doi.org/10.1016/0003-2697(87)90612-9
    [42] Brown MRW, Foster JHS (1970) A simple diagnostic milk medium for Pseudomonas aeruginosa. J Clin Pathol 23: 172-177. https://doi.org/10.1136/jcp.23.2.172
    [43] Walsh GA, Murphy RA, Killeen GF, et al. (1995) Technical note: Detection and quantification of supplemental fungal b-glucanase activity in animal feed. J Anim Sci 73: 1074-1076. https://doi.org/10.2527/1995.7341074x
    [44] Malleswari D, Bagyanarayan G (2017) In vitro screening of rhizobacteria isolated from the rhizosphere of medicinal and aromatic plants for multiple plant growth promoting activities. J Microbiol Biotechnol Res 3: 84-91.
    [45] Howe TG, Ward JM (1976) The utilization of tween 80 as carbon source by Pseudomonas. J Gen Microbiol 92: 234-235. https://doi.org/10.1099/00221287-92-1-234
    [46] Bano N, Musarrat J (2003) Characterization of a new Pseudomonas aeruginosa strain NJ-15 as a potential biocontrol agent. Curr Microbiol 46: 324-328. https://doi.org/10.1007/s00284-002-3857-8
    [47] Egamberdieva D, Kucharova Z (2009) Selection for root colonising bacteria stimulating wheat growth in saline soils. Biol Fertil Soils 45: 561-573. https://doi.org/10.1007/s00374-009-0366-y
    [48] Chen Q, Liu S, Bai Y, et al. (2014) Screening and identification of phosphate-solubilizing bacteria from reclaimed soil in Shanxi mining area. Plant Nutr Fertilizer Sci 20: 1505-1516.
    [49] Egamberdieva D, Wirth S, Li L, et al. (2017c) Microbial cooperation in the rhizosphere improves liquorice growth under salt stress. Bioengineered 8: 433-438. https://doi.org/10.1080/21655979.2016.1250983
    [50] Ali S, Duan J, Charles TC, et al. (2014) A bioinformatics approach to the determination of genes involved in endophytic behavior in Burkholderia spp. J Theor Biol 343: 193-198. https://doi.org/10.1016/j.jtbi.2013.10.007
    [51] Cho ST, Chang HH, Egamberdieva D, et al. (2015) Genome analysis of Pseudomonas fluorescens PCL1751: a rhizobacterium that controls root diseases and alleviates salt stress for its plant host. PLoS ONE 10: e0140231. https://doi.org/10.1371/journal.pone.0140231
    [52] Zhao L, Xu Y, Lai XH, et al. (2015) Screening and characterization of endophytic Bacillus and Paenibacillus strains from medicinal plant Lonicera japonica for use as potential plant growth promoters. Braz J Microbiol 46: 977-989. https://doi.org/10.1590/S1517-838246420140024
    [53] Preveena J, Bhore SJ (2013) Identification of bacterial endophytes associated with traditional medicinal plant Tridax procumbens Linn. Anc Sci Life 32: 173-177. https://doi.org/10.4103/0257-7941.123002
    [54] Webster G, Mullins AJ, Cunningham-Oakes E, et al. (2020) Culturable diversity of bacterial endophytes associated with medicinal plants of the Western Ghats, India. FEMS Microbiol Ecol 96: fiaa147. https://doi.org/10.1093/femsec/fiaa147
    [55] Liu YH, Guo JW, Salam N, et al. (2016) Culturable endophytic bacteria associated with medicinal plant Ferula songorica: molecular phylogeny, distribution and screening for industrially important traits. 3 Biotech 6: 209. https://doi.org/10.1007/s13205-016-0522-7
    [56] Chi F, Shen S, Cheng H, et al. (2005) Ascending migration of endophytic rhizobia, from roots to leaves, inside rice plants and assessment of benefits to rice growth physiology. Appl Environ Microbiol 71: 7271-7278. https://doi.org/10.1128/AEM.71.11.7271-7278.2005
    [57] Shi W, Su G, Li M, et al. (2021) Distribution of bacterial endophytes in the non-lesion tissues of potato and their response to potato common scab. Front Microbiol 12: 616013. https://doi.org/10.3389/fmicb.2021.616013
    [58] Goryluk A, Rekosz-Burlaga H, Blaszczyk M (2009) Isolation and characterization of bacterial endophytes of Chelidonium majus L. Pol J Microbiol 58: 355-361.
    [59] Mehanni MM, Safwat MS (2010) Endophytes of medicinal plants. Acta Hortic 854: 31-40. https://doi.org/10.17660/ActaHortic.2010.854.3
    [60] Egamberdieva D, Kucharova Z, Davranov K, et al. (2011) Bacteria able to control foot and root rot and to promote growth of cucumber in salinated soils. Biol Fertil Soils 47: 197-205. https://doi.org/10.1007/s00374-010-0523-3
    [61] Nongkhlaw FMW, Joshi SR (2014) Epiphytic and endophytic bacteria that promote growth of ethnomedicinal plants in the subtropical forests of Meghalaya, India. Rev Biol Trop 62: 1295-1308. https://doi.org/10.15517/rbt.v62i4.12138
    [62] Liu Y, Mohamad OAA, Salam N, et al. (2019) Diversity, community distribution and growth promotion activities of endophytes associated with halophyte Lycium ruthenicum Murr. 3 Biotech 9: 144. https://doi.org/10.1007/s13205-019-1678-8
    [63] Ferchichi N, Toukabri W, Boularess M, et al. (2019) Isolation, identification and plant growth promotion ability of endophytic bacteria associated with lupine root nodule grown in Tunisian soil. Arch Microbiol 201: 1333-1349. https://doi.org/10.1007/s00203-019-01702-3
    [64] Fernando TC, Cruz JA (2019) Profiling and biochemical identification of potential plant growth-promoting endophytic bacteria from Nypa fruticans. Philipp J Crop Sci 44: 77-85. https://doi.org/10.13140/RG.2.2.15641.98408
    [65] Rana KL, Kour D, Yadav AH (2019) Endophytic microbiomes: Biodiversity, ecological significance and biotechnological applications. Res J Biotechnol 14: 142-162.
    [66] Siddiqui ZA (2005) PGPR: prospective biocontrol agents of plant pathogens. PGPR: biocontrol and biofertilization. Dordrecht: Springer 111-142. https://doi.org/10.1007/1-4020-4152-7_4
    [67] Michelsen CF, Stougaard P (2012) Hydrogen cyanide synthesis and antifungal activity of the biocontrol strain Pseudomonas fluorescens In5 from Greenland is highly dependent on growth medium. Can J Microbiol 58: 381-390. https://doi.org/10.1139/w2012-004
    [68] Ahmed EA, Hassan EA, El Tobgy KMK, et al. (2014) Evaluation of rhizobacteria of some medicinal plants for plant growth promotion and biological control. Ann Agric Sci 59: 273-280. https://doi.org/10.1016/j.aoas.2014.11.016
    [69] Arun B, Gopinath B, Sharma S (2012) Plant growth promoting potential of bacteria isolated on N free media from rhizosphere of Cassia occidentalis. World J Microbiol Biotechnol 28: 2849-2857. https://doi.org/10.1007/s11274-012-1095-1
    [70] Ray S, Singh S, Sarma BK, et al. (2016) Endophytic alcaligenes isolated from horticultural and medicinal crops promotes growth in Okra (Abelmoschus esculentus). J Plant Growth Regul 35: 401-412. https://doi.org/10.1007/s00344-015-9548-z
    [71] Chowdhury EK, Jeon J, Rim SK, et al. (2017) Composition, diversity and bioactivity of culturable bacterial endophytes in mountain-cultivated ginseng in Korea. Sci Rep 7: 1-10. https://doi.org/10.1038/s41598-017-10280-7
    [72] Wozniak M, Gałazka A, Tyskiewicz R, et al. (2019) Endophytic bacteria potentially promote plant growth by synthesizing different metabolites and their phenotypic/physiological profiles in the Biolog GEN III MicroPlateTM Test. Int J Mol Sci 20: 1-24. https://doi.org/10.3390/ijms20215283
    [73] Musa Z, Ma J, Egamberdieva D, et al. (2020) Diversity and antimicrobial potential of cultivable endophytic actinobacteria associated with medicinal plant Thymus roseus. Front Microbiol 11: 191. https://doi.org/10.3389/fmicb.2020.00191
    [74] Glick BR (2014) Bacteria with ACC deaminase can promote plant growth and help to feed the world. Microbiol Res 169: 30-39. https://doi.org/10.1016/j.micres.2013.09.009
    [75] Leong J (1986) Siderophores: their biochemistry and possible role in the biocontrol of plant pathogens. Annu Rev Phytopathol 24: 187-209. https://doi.org/10.1146/annurev.py.24.090186.001155
    [76] Neilands JB, Leong SA (1986) Siderophores in relation to plant growth and disease. Annu Rev Plant Physiol 37: 187-208. https://doi.org/10.1146/annurev.pp.37.060186.001155
    [77] Goldstein AH (1986) Bacterial solubilization of mineral phosphates: Historical perspective and future prospects. Amer J Alternat Agric 1: 51-57. https://doi.org/10.1017/S0889189300000886
    [78] Sudarshna, Sharma N (2024) Endophytic bacteria associated with critically endangered medicinal plant Trillium govanianum (Wall ex. Royle) and their potential in soil nutrition alleviation. Plant Stress 11: 100349. https://doi.org/10.1016/j.stress.2024.100349
    [79] Deepa N, Chauhan Sh, Singh A (2024) Unraveling the functional characteristics of endophytic bacterial diversity for plant growth promotion and enhanced secondary metabolite production in Pelargonium graveolens. Microbiol Res 283: 127673. https://doi.org/10.1016/j.micres.2024.127673
  • This article has been cited by:

    1. Chang Xu, Yu Jia, Liehuang Zhu, Chuan Zhang, Guoxie Jin, Kashif Sharif, TDFL: Truth Discovery Based Byzantine Robust Federated Learning, 2022, 33, 1045-9219, 4835, 10.1109/TPDS.2022.3205714
    2. Jie Wen, Zhixia Zhang, Yang Lan, Zhihua Cui, Jianghui Cai, Wensheng Zhang, A survey on federated learning: challenges and applications, 2023, 14, 1868-8071, 513, 10.1007/s13042-022-01647-y
    3. Qingtie Li, Xuemei Wang, Shougang Ren, A Privacy Robust Aggregation Method Based on Federated Learning in the IoT, 2023, 12, 2079-9292, 2951, 10.3390/electronics12132951
    4. Wenbin Yao, Bangli Pan, Yingying Hou, Xiaoyong Li, Yamei Xia, An Adaptive Model Filtering Algorithm Based on Grubbs Test in Federated Learning, 2023, 25, 1099-4300, 715, 10.3390/e25050715
    5. Chang Zhang, Shunkun Yang, Lingfeng Mao, Huansheng Ning, Anomaly detection and defense techniques in federated learning: a comprehensive review, 2024, 57, 1573-7462, 10.1007/s10462-024-10796-1
    6. Hiralal Bhaskar Solunke, Pawan Bhaladhare, Amol Potgantwar, 2024, chapter 17, 9798369334942, 299, 10.4018/979-8-3693-3494-2.ch017
    7. Caiyu Su, Jinri Wei, Yuan Lei, Hongkun Xuan, Jiahui Li, Chenchu Xu, Empowering precise advertising with Fed-GANCC: A novel federated learning approach leveraging Generative Adversarial Networks and group clustering, 2024, 19, 1932-6203, e0298261, 10.1371/journal.pone.0298261
    8. Kai Hu, Sheng Gong, Qi Zhang, Chaowen Seng, Min Xia, Shanshan Jiang, An overview of implementing security and privacy in federated learning, 2024, 57, 1573-7462, 10.1007/s10462-024-10846-8
    9. S. Annamalai, N. Sangeetha, M. Kumaresan, Dommaraju Tejavarma, Gandhodi Harsha Vardhan, A. Suresh Kumar, 2025, 9781394219216, 127, 10.1002/9781394219230.ch7
    10. Zheng Yang, Ke Gu, Yiming Zuo, Byzantine Robust Federated Learning Scheme Based on Backdoor Triggers, 2024, 79, 1546-2226, 2813, 10.32604/cmc.2024.050025
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1350) PDF downloads(97) Cited by(1)

Figures and Tables

Figures(3)  /  Tables(5)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog