{"id":"https://openalex.org/W4410341164","doi":"https://doi.org/10.1109/icnc64010.2025.10993760","title":"CloakFed: Exploring Stealthy and Adaptive Backdoor Attacks in Federated Learning","display_name":"CloakFed: Exploring Stealthy and Adaptive Backdoor Attacks in Federated Learning","publication_year":2025,"publication_date":"2025-02-17","ids":{"openalex":"https://openalex.org/W4410341164","doi":"https://doi.org/10.1109/icnc64010.2025.10993760"},"language":"en","primary_location":{"id":"doi:10.1109/icnc64010.2025.10993760","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc64010.2025.10993760","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012642979","display_name":"Kaibo Wang","orcid":"https://orcid.org/0000-0001-9888-4323"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kaibo Wang","raw_affiliation_strings":["Donghua University,College of Information Science and Technology,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"Donghua University,College of Information Science and Technology,Shanghai,China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100336637","display_name":"Anqi Zhang","orcid":"https://orcid.org/0000-0003-3602-7443"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anqi Zhang","raw_affiliation_strings":["Donghua University,College of Information Science and Technology,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"Donghua University,College of Information Science and Technology,Shanghai,China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021877591","display_name":"Tangyou Liu","orcid":"https://orcid.org/0000-0001-6445-1933"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tangyou Liu","raw_affiliation_strings":["Donghua University,College of Information Science and Technology,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"Donghua University,College of Information Science and Technology,Shanghai,China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100749050","display_name":"Wenqian Zhang","orcid":"https://orcid.org/0000-0003-2007-6478"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenqian Zhang","raw_affiliation_strings":["Donghua University,College of Information Science and Technology,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"Donghua University,College of Information Science and Technology,Shanghai,China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014686940","display_name":"Guanglin Zhang","orcid":"https://orcid.org/0000-0003-4095-6843"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guanglin Zhang","raw_affiliation_strings":["Donghua University,College of Information Science and Technology,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"Donghua University,College of Information Science and Technology,Shanghai,China","institution_ids":["https://openalex.org/I181326427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012642979"],"corresponding_institution_ids":["https://openalex.org/I181326427"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05167794,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"156","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.996806263923645},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6750685572624207},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6685792207717896}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.996806263923645},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6750685572624207},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6685792207717896}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnc64010.2025.10993760","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc64010.2025.10993760","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2194775991","https://openalex.org/W2551176409","https://openalex.org/W2798626461","https://openalex.org/W2887335106","https://openalex.org/W4213446860","https://openalex.org/W4221129260","https://openalex.org/W4382469137","https://openalex.org/W4384946090","https://openalex.org/W4385187226","https://openalex.org/W4386301311","https://openalex.org/W4390105424","https://openalex.org/W4399159809","https://openalex.org/W4402264407","https://openalex.org/W6743821447","https://openalex.org/W6752600739","https://openalex.org/W6756756286","https://openalex.org/W6787633081","https://openalex.org/W6787972765","https://openalex.org/W6810227880","https://openalex.org/W6839074529","https://openalex.org/W6856003640","https://openalex.org/W6864569371","https://openalex.org/W7056673059"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4401407399"],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"is":[3],"a":[4,16,105,131,236],"privacy-preserving":[5],"distributed":[6,26],"machine":[7],"learning":[8],"paradigm":[9],"that":[10,233],"enables":[11,203],"participants":[12,39],"to":[13,54,71,84,116,134,142,151,176,205,246],"collaboratively":[14],"train":[15],"global":[17,52],"model":[18,42,53,93,193,197],"without":[19],"sharing":[20],"local":[21,48],"private":[22],"data.":[23],"However,":[24],"the":[25,31,41,51,86,92,97,121,125,146,161,167,183,212],"nature":[27],"of":[28,34,120,163,214],"FL":[29,109,250],"introduces":[30],"potential":[32,178],"risk":[33,162],"backdoor":[35,62,110,122,168,208,251],"attacks,":[36],"where":[37],"malicious":[38],"manipulate":[40],"by":[43,182],"injecting":[44],"trigger":[45,136],"patterns":[46,137],"during":[47,91],"training,":[49],"causing":[50],"make":[55],"incorrect":[56],"predictions":[57],"for":[58],"specific":[59],"inputs.":[60],"Traditional":[61],"attacks":[63,81,195,209],"usually":[64],"involve":[65],"fixed-pattern":[66],"triggers,":[67],"which":[68,114],"are":[69],"vulnerable":[70],"detection":[72],"or":[73,196],"filtering":[74],"in":[75,154,211,254],"subsequent":[76],"validation":[77],"stages.":[78],"Moreover,":[79],"these":[80,101],"often":[82],"fail":[83],"bypass":[85],"complex":[87],"defense":[88,179,216],"mechanisms":[89],"employed":[90,181],"training":[94,169],"phase":[95],"on":[96,226],"server.":[98],"To":[99,218],"address":[100],"issues,":[102],"we":[103,222],"propose":[104],"stealthy":[106,132],"and":[107,159,185,256,264],"adaptive":[108],"attack":[111,189,239,258],"framework,":[112],"CloakFed,":[113],"aims":[115],"hide":[117],"all":[118],"traces":[119],"attack.":[123],"In":[124,166],"data":[126,153],"processing":[127],"phase,":[128,170],"CloakFed":[129,171,204,234,260],"uses":[130],"generator":[133],"produce":[135],"with":[138],"hidden":[139],"features":[140],"similar":[141,150],"target":[143],"labels,":[144],"making":[145],"poisoned":[147],"samples":[148],"more":[149],"normal":[152],"distribution,":[155],"thus":[156],"enhancing":[157],"stealth":[158],"reducing":[160],"manual":[164],"detection.":[165],"inspects":[172],"hook":[173],"return":[174],"values":[175],"infer":[177],"strategies":[180],"server":[184],"adaptively":[186],"selects":[187],"appropriate":[188],"methods,":[190],"such":[191],"as":[192],"dimension":[194],"space":[198],"attacks.":[199,252],"This":[200],"flexible":[201],"strategy":[202],"effectively":[206],"execute":[207],"even":[210],"presence":[213],"diverse":[215],"mechanisms.":[217],"validate":[219],"CloakFed\u2019s":[220],"effectiveness,":[221],"conducted":[223],"extensive":[224],"experiments":[225],"three":[227,247],"different":[228],"datasets.":[229],"Experimental":[230],"results":[231],"demonstrate":[232],"achieves":[235],"significantly":[237],"higher":[238],"success":[240],"rate":[241],"under":[242],"various":[243],"defenses":[244],"compared":[245],"existing":[248],"classic":[249],"Specifically,":[253],"fixed-frequency":[255],"few-shot":[257],"scenarios,":[259],"exhibits":[261],"superior":[262],"stability":[263],"persistence.":[265]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
