{"id":"https://openalex.org/W4411551461","doi":"https://doi.org/10.1109/cscwd64889.2025.11033513","title":"Poisoning Attacks Against Federated Recommender Systems and the Defenses: A Survey","display_name":"Poisoning Attacks Against Federated Recommender Systems and the Defenses: A Survey","publication_year":2025,"publication_date":"2025-05-05","ids":{"openalex":"https://openalex.org/W4411551461","doi":"https://doi.org/10.1109/cscwd64889.2025.11033513"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd64889.2025.11033513","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd64889.2025.11033513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045916564","display_name":"Dingyi Pan","orcid":"https://orcid.org/0000-0002-4804-2942"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Donglin Pan","raw_affiliation_strings":["School of Cyber Security and Computer, Hebei University,Baoding,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Computer, Hebei University,Baoding,China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100376170","display_name":"Yifan Liu","orcid":"https://orcid.org/0000-0001-5261-3958"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yifan Liu","raw_affiliation_strings":["School of Cyber Security and Computer, Hebei University,Baoding,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Computer, Hebei University,Baoding,China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100441397","display_name":"Ziyi Wang","orcid":"https://orcid.org/0009-0009-5428-0494"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyi Wang","raw_affiliation_strings":["International College, Hebei University,Baoding,China"],"affiliations":[{"raw_affiliation_string":"International College, Hebei University,Baoding,China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101628925","display_name":"Yi Liu","orcid":"https://orcid.org/0000-0003-3718-124X"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Liu","raw_affiliation_strings":["School of Cyber Security and Computer, Hebei University,Baoding,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Computer, Hebei University,Baoding,China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109393846","display_name":"Zhao Ze","orcid":null},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ze Zhao","raw_affiliation_strings":["School of Cyber Security and Computer, Hebei University,Baoding,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Computer, Hebei University,Baoding,China","institution_ids":["https://openalex.org/I43337087"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5045916564"],"corresponding_institution_ids":["https://openalex.org/I43337087"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07783639,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2071","last_page":"2076"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9692999720573425,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9692999720573425,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9682999849319458,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.7166838049888611},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6752108335494995},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5375629663467407},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3662647008895874},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3355838656425476}],"concepts":[{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.7166838049888611},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6752108335494995},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5375629663467407},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3662647008895874},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3355838656425476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd64889.2025.11033513","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd64889.2025.11033513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2791170775","https://openalex.org/W2903665338","https://openalex.org/W3012231004","https://openalex.org/W3031339255","https://openalex.org/W3119520312","https://openalex.org/W3154290626","https://openalex.org/W3156766660","https://openalex.org/W3161225848","https://openalex.org/W3174074918","https://openalex.org/W3178746453","https://openalex.org/W4224942092","https://openalex.org/W4226021524","https://openalex.org/W4226493408","https://openalex.org/W4290944580","https://openalex.org/W4293452925","https://openalex.org/W4321521256","https://openalex.org/W4367044632","https://openalex.org/W4382239710","https://openalex.org/W4384655830","https://openalex.org/W4385567698","https://openalex.org/W4387868958","https://openalex.org/W4392078504","https://openalex.org/W4392360718","https://openalex.org/W4396757545","https://openalex.org/W6728757088","https://openalex.org/W6748786018","https://openalex.org/W6758813588","https://openalex.org/W6779005175","https://openalex.org/W6849571393"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4390273403","https://openalex.org/W4386781444","https://openalex.org/W2150182025","https://openalex.org/W3092950680","https://openalex.org/W3197542405","https://openalex.org/W2056712470","https://openalex.org/W3125580266"],"abstract_inverted_index":{"Federated":[0],"recommender":[1,58,89,148],"systems":[2,59],"(FedRecs)":[3],"can":[4,65],"effectively":[5,47],"address":[6,142],"the":[7,40,44,67,101,104,106,110,113,116,143,160,163],"problem":[8],"of":[9,84,103,109,115,162],"information":[10],"overload":[11],"without":[12],"using":[13],"users'":[14],"private":[15],"data.":[16],"Based":[17],"on":[18,100],"federated":[19,57,88,147],"learning,":[20],"FedRecs":[21,30],"have":[22],"achieved":[23],"significant":[24],"success":[25],"in":[26,136,146],"protecting":[27],"user":[28],"privacy.":[29,49],"allow":[31],"users":[32,167],"to":[33,43,61,141,152,158],"train":[34],"recommendation":[35,68,170],"models":[36],"locally":[37],"and":[38,97,112,126,165],"upload":[39],"trained":[41],"gradients":[42],"server,":[45],"which":[46],"protect":[48],"However,":[50],"this":[51,137],"decentralized":[52],"learning":[53],"paradigm":[54],"also":[55,122],"makes":[56],"vulnerable":[60],"poisoning":[62,71,85],"attacks.":[63],"Attackers":[64],"manipulate":[66],"results":[69],"by":[70],"local":[72],"training":[73],"datasets":[74],"or":[75],"uploading":[76],"toxic":[77],"gradients.":[78],"This":[79],"paper":[80],"provides":[81],"an":[82],"overview":[83],"attacks":[86],"against":[87],"systems,":[90,149],"introducing":[91],"them":[92],"from":[93],"three":[94],"perspectives.":[95],"Classify":[96],"discuss":[98,127],"based":[99],"purpose":[102],"attacker,":[105,111],"prior":[107],"knowledge":[108],"method":[114],"attack,":[117],"respectively.":[118],"In":[119,139],"addition,":[120],"we":[121,150],"summarize":[123],"defense":[124,156],"strategies":[125],"future":[128],"directions,":[129],"offering":[130],"a":[131],"broader":[132],"perspective":[133],"for":[134],"researchers":[135],"field.":[138],"order":[140],"security":[144,161],"issues":[145],"need":[151],"continuously":[153],"explore":[154],"effective":[155],"mechanisms":[157],"ensure":[159],"system":[164],"provide":[166],"with":[168],"reliable":[169],"services.":[171]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
