{"id":"https://openalex.org/W4405272059","doi":"https://doi.org/10.1109/icceic64099.2024.10775988","title":"Manipulation and Destruction: A Novel Hybrid Poisoning Attack Against Federated Recommender Systems","display_name":"Manipulation and Destruction: A Novel Hybrid Poisoning Attack Against Federated Recommender Systems","publication_year":2024,"publication_date":"2024-10-11","ids":{"openalex":"https://openalex.org/W4405272059","doi":"https://doi.org/10.1109/icceic64099.2024.10775988"},"language":"en","primary_location":{"id":"doi:10.1109/icceic64099.2024.10775988","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icceic64099.2024.10775988","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 5th International Conference on Computer Engineering and Intelligent Control (ICCEIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100441397","display_name":"Ziyi Wang","orcid":"https://orcid.org/0009-0009-5428-0494"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ziyi Wang","raw_affiliation_strings":["International College Hebei University,Baoding,China"],"affiliations":[{"raw_affiliation_string":"International College Hebei University,Baoding,China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100657035","display_name":"Liyuan Liu","orcid":"https://orcid.org/0000-0003-2585-323X"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liyuan Liu","raw_affiliation_strings":["School of Cyber Security and Computer Hebei University,Baoding,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Computer Hebei University,Baoding,China","institution_ids":["https://openalex.org/I43337087"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100441397"],"corresponding_institution_ids":["https://openalex.org/I43337087"],"apc_list":null,"apc_paid":null,"fwci":0.8118,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81780479,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"251","last_page":"255"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.963100016117096,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.8393644094467163},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7588577270507812},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4502890408039093},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3220256567001343},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2832072377204895}],"concepts":[{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.8393644094467163},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7588577270507812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4502890408039093},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3220256567001343},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2832072377204895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icceic64099.2024.10775988","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icceic64099.2024.10775988","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 5th International Conference on Computer Engineering and Intelligent Control (ICCEIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2159094788","https://openalex.org/W2219888463","https://openalex.org/W2605350416","https://openalex.org/W2750814160","https://openalex.org/W3047789363","https://openalex.org/W3064112253","https://openalex.org/W4224942092","https://openalex.org/W4226493408","https://openalex.org/W4290944580","https://openalex.org/W4382239710","https://openalex.org/W4392616667","https://openalex.org/W4393153286","https://openalex.org/W4396758702","https://openalex.org/W6728757088"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4390273403","https://openalex.org/W4386781444","https://openalex.org/W2150182025","https://openalex.org/W3092950680","https://openalex.org/W3197542405","https://openalex.org/W2056712470","https://openalex.org/W3125580266"],"abstract_inverted_index":{"Due":[0],"to":[1,4,43,46,58,68,86],"its":[2],"ability":[3],"protect":[5],"privacy,":[6],"federated":[7,50,78,119],"recommender":[8,15,120,133,168],"systems":[9,16,134],"have":[10,32],"received":[11],"widespread":[12],"attention.":[13],"Federated":[14],"collaboratively":[17],"learn":[18],"recommendation":[19,38,79,148],"models":[20],"without":[21,135],"sharing":[22],"user":[23],"data,":[24],"effectively":[25,166],"preserving":[26],"privacy.":[27],"In":[28,101],"recent":[29],"years,":[30],"researchers":[31],"not":[33],"only":[34,105],"focused":[35],"on":[36,75,88,107,137,154],"improving":[37],"efficiency,":[39],"but":[40],"also":[41,64],"begun":[42],"pay":[44],"attention":[45],"security":[47],"issues":[48],"of":[49,97,118,144,177],"recommendations.":[51],"Since":[52],"all":[53],"clients":[54],"can":[55,63,131,165],"upload":[56],"gradients":[57],"train":[59],"the":[60,116,142],"model,":[61],"adversaries":[62],"exploit":[65],"this":[66],"property":[67],"carry":[69],"out":[70],"poisoning":[71],"attacks.":[72],"However,":[73],"research":[74,104],"attacks":[76],"against":[77],"is":[80],"still":[81],"incomplete,":[82],"and":[83,92,112,146],"attackers":[84],"need":[85],"rely":[87],"excessive":[89],"prior":[90,139],"knowledge":[91],"manipulate":[93,173],"a":[94,108,124,174],"large":[95],"number":[96],"malicious":[98],"ellen":[99],"ts.":[100],"addition,":[102],"existing":[103],"focuses":[106],"single":[109],"attack":[110,127,132,167],"method":[111,164],"objective.":[113],"To":[114],"reveal":[115],"vulnerability":[117],"systems,":[121,169],"we":[122,172],"propose":[123],"novel":[125],"hybrid":[126],"called":[128],"FedRecHP":[129],"A.It":[130],"relying":[136],"any":[138],"knowledge,":[140],"achieving":[141],"goal":[143],"manipulating":[145],"destroying":[147],"systems.":[149],"We":[150],"conducted":[151],"extensive":[152],"experiments":[153],"two":[155],"real-world":[156],"datasets.":[157],"The":[158],"results":[159],"indicate":[160],"that":[161],"our":[162],"proposed":[163],"even":[170],"if":[171],"small":[175],"proportion":[176],"fake":[178],"users.":[179]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
