{"id":"https://openalex.org/W4412631478","doi":"https://doi.org/10.1007/s44443-025-00146-8","title":"A sparse and invisible targeted backdoor attack in federated learning","display_name":"A sparse and invisible targeted backdoor attack in federated learning","publication_year":2025,"publication_date":"2025-07-24","ids":{"openalex":"https://openalex.org/W4412631478","doi":"https://doi.org/10.1007/s44443-025-00146-8"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-025-00146-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00146-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00146-8.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00146-8.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073406431","display_name":"Qikun Zhang","orcid":"https://orcid.org/0000-0002-6117-5686"},"institutions":[{"id":"https://openalex.org/I23171815","display_name":"Zhengzhou University of Light Industry","ror":"https://ror.org/05fwr8z16","country_code":"CN","type":"education","lineage":["https://openalex.org/I23171815"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qikun Zhang","raw_affiliation_strings":["Zhengzhou University of Light Industry, School of Computer Science and Technology, Zhengzhou, Henan, 450002, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Zhengzhou University of Light Industry, School of Computer Science and Technology, Zhengzhou, Henan, 450002, China","institution_ids":["https://openalex.org/I23171815"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074195382","display_name":"Mengyang Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I23171815","display_name":"Zhengzhou University of Light Industry","ror":"https://ror.org/05fwr8z16","country_code":"CN","type":"education","lineage":["https://openalex.org/I23171815"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengyang Yu","raw_affiliation_strings":["Zhengzhou University of Light Industry, School of Computer Science and Technology, Zhengzhou, Henan, 450002, China"],"raw_orcid":"https://orcid.org/0009-0007-2462-0502","affiliations":[{"raw_affiliation_string":"Zhengzhou University of Light Industry, School of Computer Science and Technology, Zhengzhou, Henan, 450002, China","institution_ids":["https://openalex.org/I23171815"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100769141","display_name":"Ruifang Wang","orcid":"https://orcid.org/0000-0002-0399-8115"},"institutions":[{"id":"https://openalex.org/I23171815","display_name":"Zhengzhou University of Light Industry","ror":"https://ror.org/05fwr8z16","country_code":"CN","type":"education","lineage":["https://openalex.org/I23171815"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruifang Wang","raw_affiliation_strings":["Zhengzhou University of Light Industry, School of Computer Science and Technology, Zhengzhou, Henan, 450002, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Zhengzhou University of Light Industry, School of Computer Science and Technology, Zhengzhou, Henan, 450002, China","institution_ids":["https://openalex.org/I23171815"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108720209","display_name":"Yongjiao Li","orcid":null},"institutions":[{"id":"https://openalex.org/I143593769","display_name":"East China University of Science and Technology","ror":"https://ror.org/01vyrm377","country_code":"CN","type":"education","lineage":["https://openalex.org/I143593769"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongjiao Li","raw_affiliation_strings":["East China University of Science and Technology, Department and Organization, Key Laboratory of Smart Manufacturing in Energy Chemical Process, Ministry of Education, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"East China University of Science and Technology, Department and Organization, Key Laboratory of Smart Manufacturing in Energy Chemical Process, Ministry of Education, Shanghai, China","institution_ids":["https://openalex.org/I143593769"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001730354","display_name":"Junling Yuan","orcid":"https://orcid.org/0000-0001-6734-9256"},"institutions":[{"id":"https://openalex.org/I23171815","display_name":"Zhengzhou University of Light Industry","ror":"https://ror.org/05fwr8z16","country_code":"CN","type":"education","lineage":["https://openalex.org/I23171815"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junling Yuan","raw_affiliation_strings":["Zhengzhou University of Light Industry, School of Computer Science and Technology, Zhengzhou, Henan, 450002, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Zhengzhou University of Light Industry, School of Computer Science and Technology, Zhengzhou, Henan, 450002, China","institution_ids":["https://openalex.org/I23171815"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003198271","display_name":"Yu\u2010an Tan","orcid":"https://orcid.org/0000-0001-6404-8853"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu-an Tan","raw_affiliation_strings":["Beijing Institute of Technology, School of Computer Science and Technology, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Beijing Institute of Technology, School of Computer Science and Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5073406431"],"corresponding_institution_ids":["https://openalex.org/I23171815"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":2.0776,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.89117358,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"37","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9878931045532227},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.531548261642456},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41888678073883057},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4141905903816223}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9878931045532227},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.531548261642456},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41888678073883057},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4141905903816223}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-025-00146-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00146-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00146-8.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e6396a24a0d642949517e6e9a1fdab80","is_oa":true,"landing_page_url":"https://doaj.org/article/e6396a24a0d642949517e6e9a1fdab80","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 37, Iss 6, Pp 1-13 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-025-00146-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00146-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00146-8.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5"}],"awards":[{"id":"https://openalex.org/G3631391693","display_name":null,"funder_award_id":"61971380;61772477","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3753586822","display_name":null,"funder_award_id":"61971380","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4117978028","display_name":null,"funder_award_id":"61772477","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4412631478.pdf","grobid_xml":"https://content.openalex.org/works/W4412631478.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W2962804345","https://openalex.org/W2970335439","https://openalex.org/W2982302101","https://openalex.org/W3034414373","https://openalex.org/W3042368254","https://openalex.org/W3114838227","https://openalex.org/W3127520698","https://openalex.org/W3154581591","https://openalex.org/W3175586646","https://openalex.org/W3190346330","https://openalex.org/W3196694534","https://openalex.org/W3198601816","https://openalex.org/W4205769651","https://openalex.org/W4214680449","https://openalex.org/W4283816169","https://openalex.org/W4291156115","https://openalex.org/W4304782753","https://openalex.org/W4317796293","https://openalex.org/W4372260097","https://openalex.org/W4378195077","https://openalex.org/W4378382632","https://openalex.org/W4381838940","https://openalex.org/W4382024108","https://openalex.org/W4382722948","https://openalex.org/W4385667121","https://openalex.org/W4386072042","https://openalex.org/W4387184842","https://openalex.org/W4388739459","https://openalex.org/W4400075150","https://openalex.org/W4408805382","https://openalex.org/W7056673059"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4401407399"],"abstract_inverted_index":{"In":[0,106,203],"distributed":[1],"edge":[2],"Computing":[3],"scenarios":[4],"within":[5],"the":[6,34,39,119,121,132,140,143,149,162,178],"Internet":[7],"of":[8,38,79,142,165,185],"Things":[9],"(IoT),":[10],"individual":[11],"clients":[12,30],"are":[13,81,208],"susceptible":[14],"to":[15,22,101,118,171,174],"adversarial":[16],"backdoor":[17,46],"attacks,":[18],"wherein":[19],"malicious":[20],"modifications":[21],"local":[23],"data":[24,155],"may":[25],"be":[26],"introduced.":[27],"Such":[28],"compromised":[29],"can":[31],"negatively":[32],"impact":[33],"integrity":[35],"and":[36,55,69,87,96,113,136,172,195,206],"performance":[37],"global":[40],"model":[41],"during":[42,99],"federated":[43,218],"learning.":[44],"Existing":[45],"attack":[47,52,74,126,150],"techniques":[48],"suffer":[49],"from":[50],"low":[51],"success":[53,127,151],"rates":[54],"poor":[56],"trigger":[57,89,103,180],"concealment.":[58,104],"To":[59],"address":[60],"this":[61,63],"issue,":[62],"paper":[64],"proposes":[65],"a":[66,124,182,188],"novel":[67],"Sparse":[68],"Invisible":[70],"Targeted":[71],"Backdoor":[72],"(SITB)":[73],"method.":[75,145],"The":[76],"key":[77],"advantages":[78],"SITB":[80],"as":[82,191,193,199,201],"follows:":[83],"(1)":[84],"A":[85],"sparse":[86,107],"invisible":[88],"generation":[90],"approach":[91],"is":[92],"introduced,":[93],"enforcing":[94],"sparsity":[95],"invisibility":[97],"constraints":[98],"optimization":[100],"enhance":[102],"(2)":[105],"constraints,":[108],"by":[109,159],"ranking":[110],"gradient":[111],"values":[112],"selecting":[114],"pixels":[115],"most":[116],"sensitive":[117],"model,":[120],"method":[122],"achieves":[123],"high":[125,183,192,200],"rate.":[128],"Extensive":[129],"experiments":[130],"on":[131,153],"CIFAR-10":[133],"public":[134],"dataset":[135,138],"PathMNIST":[137],"validate":[139],"effectiveness":[141],"proposed":[144],"Results":[146],"show":[147],"that":[148,177],"rate":[152],"poisoned":[154],"surpasses":[156],"existing":[157],"methods":[158],"5\u201310%.":[160],"Furthermore,":[161],"quantitative":[163],"assessment":[164],"visual":[166],"quality,":[167],"conducted":[168],"both":[169],"prior":[170],"subsequent":[173],"poisoning,":[175],"affirmed":[176],"generated":[179],"exhibited":[181],"degree":[184],"stealthiness,":[186],"boasting":[187],"PSNR":[189],"value":[190,198],"40":[194],"an":[196],"SSIM":[197],"0.99.":[202],"addition,":[204],"SPAM":[205],"SRM":[207],"extremely":[209],"low.":[210],"Moreover,":[211],"it":[212],"demonstrates":[213],"robust":[214],"resistance":[215],"against":[216],"multiple":[217],"learning":[219],"defense":[220],"mechanisms.":[221]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
