A sparse and invisible targeted backdoor attack in federated learning
Abstract In distributed edge Computing scenarios within the Internet of Things (IoT), individual clients are susceptible to adversarial backdoor attacks, wherein malicious modifications to local data may be introduced. Such compromised clients can negatively impact the integrity and performance of t...
| Published in: | Journal of King Saud University: Computer and Information Sciences |
|---|---|
| Main Authors: | Qikun Zhang, Mengyang Yu, Ruifang Wang, Yongjiao Li, Junling Yuan, Yu-an Tan |
| Format: | Article |
| Language: | English |
| Published: |
Springer
2025-07-01
|
| Subjects: | |
| Online Access: | https://doi.org/10.1007/s44443-025-00146-8 |
Similar Items
Persistent Backdoor Attack for Federated Learning Based on Trigger Differential Optimization
by: JIANG Yufei, TIAN Yulong, ZHAO Yanchao
Published: (2025-04-01)
by: JIANG Yufei, TIAN Yulong, ZHAO Yanchao
Published: (2025-04-01)
Defense Method Against Backdoor Attack in Federated Learning for Industrial Scenarios
by: WANG Xun, XU Fangmin, ZHAO Chenglin, LIU Hongfu
Published: (2024-01-01)
by: WANG Xun, XU Fangmin, ZHAO Chenglin, LIU Hongfu
Published: (2024-01-01)
Vulnerability analysis of federated learning malware detection systems based on backdoor attacks
by: LU Xingyu; CAO Yang
Published: (2024-09-01)
by: LU Xingyu; CAO Yang
Published: (2024-09-01)
Federated Learning Backdoor Attack Based on Frequency Domain Injection
by: Jiawang Liu, et al.
Published: (2024-02-01)
by: Jiawang Liu, et al.
Published: (2024-02-01)
XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning
by: Jianyi Zhang, et al.
Published: (2024-08-01)
by: Jianyi Zhang, et al.
Published: (2024-08-01)
DAGUARD: distributed backdoor attack defense scheme under federated learning
by: Shengxing YU, et al.
Published: (2023-05-01)
by: Shengxing YU, et al.
Published: (2023-05-01)
DAGUARD: distributed backdoor attack defense scheme under federated learning
by: Shengxing YU, et al.
Published: (2023-05-01)
by: Shengxing YU, et al.
Published: (2023-05-01)
FLARE: A Backdoor Attack to Federated Learning with Refined Evasion
by: Qingya Wang, et al.
Published: (2024-11-01)
by: Qingya Wang, et al.
Published: (2024-11-01)
Backdoor defense method in federated learning based on contrastive training
by: Jiale ZHANG, et al.
Published: (2024-03-01)
by: Jiale ZHANG, et al.
Published: (2024-03-01)
Backdoor defense method in federated learning based on contrastive training
by: Jiale ZHANG, et al.
Published: (2024-03-01)
by: Jiale ZHANG, et al.
Published: (2024-03-01)
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains
by: Arthur Mercier, et al.
Published: (2023-05-01)
by: Arthur Mercier, et al.
Published: (2023-05-01)
Backdoor Attack to Giant Model in Fragment-Sharing Federated Learning
by: Senmao Qi, et al.
Published: (2024-12-01)
by: Senmao Qi, et al.
Published: (2024-12-01)
Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey
by: Yudong Li, et al.
Published: (2023-01-01)
by: Yudong Li, et al.
Published: (2023-01-01)
Defending Against Backdoor Attacks by Quarantine Training
by: Chengxu Yu, et al.
Published: (2024-01-01)
by: Chengxu Yu, et al.
Published: (2024-01-01)
Survey on Backdoor Attacks and Countermeasures in Deep Neural Network
by: QIAN Hanwei, SUN Weisong
Published: (2023-05-01)
by: QIAN Hanwei, SUN Weisong
Published: (2023-05-01)
An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences
by: Wei Guo, et al.
Published: (2022-01-01)
by: Wei Guo, et al.
Published: (2022-01-01)
Invisible Threats in the Data: A Study on Data Poisoning Attacks in Deep Generative Models
by: Ziying Yang, et al.
Published: (2024-09-01)
by: Ziying Yang, et al.
Published: (2024-09-01)
Backdoor Attack on Deep Learning Models:A Survey
by: YING Zonghao, WU Bin
Published: (2023-03-01)
by: YING Zonghao, WU Bin
Published: (2023-03-01)
Text Select-Backdoor: Selective Backdoor Attack for Text Recognition Systems
by: Hyun Kwon, et al.
Published: (2024-01-01)
by: Hyun Kwon, et al.
Published: (2024-01-01)
A4FL: Federated Adversarial Defense via Adversarial Training and Pruning Against Backdoor Attack
by: Saeed-Uz-Zaman, et al.
Published: (2025-01-01)
by: Saeed-Uz-Zaman, et al.
Published: (2025-01-01)
Sub-Band Backdoor Attack in Remote Sensing Imagery
by: Kazi Aminul Islam, et al.
Published: (2024-04-01)
by: Kazi Aminul Islam, et al.
Published: (2024-04-01)
Backdoor Attack against Face Sketch Synthesis
by: Shengchuan Zhang, et al.
Published: (2023-06-01)
by: Shengchuan Zhang, et al.
Published: (2023-06-01)
Research on method and architecture for defense assessment of artificial intelligence backdoors
by: XIE Tian, et al.
Published: (2024-09-01)
by: XIE Tian, et al.
Published: (2024-09-01)
STING: A Stealthy Backdoor Attack on GNN-Based Malicious Domain Detection via DNS Perturbations
by: Muhammad Anan, et al.
Published: (2025-01-01)
by: Muhammad Anan, et al.
Published: (2025-01-01)
Backdoor Defense of Horizontal Federated Learning Based on Random Cutting and GradientClipping
by: XU Wentao, WANG Binjun
Published: (2023-11-01)
by: XU Wentao, WANG Binjun
Published: (2023-11-01)
Homophily-Guided Backdoor Attacks on GNN-Based Link Prediction
by: Yadong Wang, et al.
Published: (2025-09-01)
by: Yadong Wang, et al.
Published: (2025-09-01)
A survey of backdoor attacks and defences: From deep neural networks to large language models
by: Ling-Xin Jin, et al.
Published: (2025-09-01)
by: Ling-Xin Jin, et al.
Published: (2025-09-01)
A Backdoor Approach With Inverted Labels Using Dirty Label-Flipping Attacks
by: Orson Mengara
Published: (2025-01-01)
by: Orson Mengara
Published: (2025-01-01)
CyberGuard: An Adaptive AI-Driven Backdoor Attack Detection
by: Iram Arshad, et al.
Published: (2025-01-01)
by: Iram Arshad, et al.
Published: (2025-01-01)
Exploring Graph Neural Backdoors in Vehicular Networks: Fundamentals, Methodologies, Applications, and Future Perspectives
by: Xiao Yang, et al.
Published: (2025-01-01)
by: Xiao Yang, et al.
Published: (2025-01-01)
A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems
by: Quentin Le Roux, et al.
Published: (2024-01-01)
by: Quentin Le Roux, et al.
Published: (2024-01-01)
Effective defense against physically embedded backdoor attacks via clustering-based filtering
by: Mohammed Kutbi
Published: (2025-04-01)
by: Mohammed Kutbi
Published: (2025-04-01)
Backdoor Attacks on Deep Neural Networks via Transfer Learning from Natural Images
by: Yuki Matsuo, et al.
Published: (2022-12-01)
by: Yuki Matsuo, et al.
Published: (2022-12-01)
Research Progress of Backdoor Attacks in Deep Neural Networks
by: HUANG Shuxin, ZHANG Quanxin, WANG Yajie, ZHANG Yaoyuan, LI Yuanzhang
Published: (2023-09-01)
by: HUANG Shuxin, ZHANG Quanxin, WANG Yajie, ZHANG Yaoyuan, LI Yuanzhang
Published: (2023-09-01)
Instance-Agnostic and Practical Clean Label Backdoor Attack Method for Deep Learning Based Face Recognition Models
by: Tae-Hoon Kim, et al.
Published: (2023-01-01)
by: Tae-Hoon Kim, et al.
Published: (2023-01-01)
Camouflage Backdoor Attack against Pedestrian Detection
by: Yalun Wu, et al.
Published: (2023-11-01)
by: Yalun Wu, et al.
Published: (2023-11-01)
DriNet: Dynamic Backdoor Attack against Automatic Speech Recognization Models
by: Jianbin Ye, et al.
Published: (2022-06-01)
by: Jianbin Ye, et al.
Published: (2022-06-01)
DLP: towards active defense against backdoor attacks with decoupled learning process
by: Zonghao Ying, et al.
Published: (2023-05-01)
by: Zonghao Ying, et al.
Published: (2023-05-01)
EEG-Based Brain–Computer Interfaces are Vulnerable to Backdoor Attacks
by: Lubin Meng, et al.
Published: (2023-01-01)
by: Lubin Meng, et al.
Published: (2023-01-01)
A Backdoor Attack Against LSTM-Based Text Classification Systems
by: Jiazhu Dai, et al.
Published: (2019-01-01)
by: Jiazhu Dai, et al.
Published: (2019-01-01)
Similar Items
-
Persistent Backdoor Attack for Federated Learning Based on Trigger Differential Optimization
by: JIANG Yufei, TIAN Yulong, ZHAO Yanchao
Published: (2025-04-01) -
Defense Method Against Backdoor Attack in Federated Learning for Industrial Scenarios
by: WANG Xun, XU Fangmin, ZHAO Chenglin, LIU Hongfu
Published: (2024-01-01) -
Vulnerability analysis of federated learning malware detection systems based on backdoor attacks
by: LU Xingyu; CAO Yang
Published: (2024-09-01) -
Federated Learning Backdoor Attack Based on Frequency Domain Injection
by: Jiawang Liu, et al.
Published: (2024-02-01) -
XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning
by: Jianyi Zhang, et al.
Published: (2024-08-01)
