{"id":"https://openalex.org/W4385078974","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182790","title":"Federating Learning Attacks: Maximizing Damage while Evading Detection","display_name":"Federating Learning Attacks: Maximizing Damage while Evading Detection","publication_year":2023,"publication_date":"2023-06-19","ids":{"openalex":"https://openalex.org/W4385078974","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182790"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc58020.2023.10182790","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc58020.2023.10182790","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091344884","display_name":"A. Gouissem","orcid":null},"institutions":[{"id":"https://openalex.org/I4210105992","display_name":"Qatar Science and Technology Park","ror":"https://ror.org/01gshyb58","country_code":"QA","type":"archive","lineage":["https://openalex.org/I4210105992"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"A. Gouissem","raw_affiliation_strings":["University of Doha for Science and Technology,College of Computing and Information Technology,Qatar","College of Computing and Information Technology, University of Doha for Science and Technology, Qatar"],"affiliations":[{"raw_affiliation_string":"University of Doha for Science and Technology,College of Computing and Information Technology,Qatar","institution_ids":["https://openalex.org/I4210105992"]},{"raw_affiliation_string":"College of Computing and Information Technology, University of Doha for Science and Technology, Qatar","institution_ids":["https://openalex.org/I4210105992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024641789","display_name":"Tamer Khattab","orcid":"https://orcid.org/0000-0003-2347-9555"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"T. Khattab","raw_affiliation_strings":["Qatar University,Electrical Engineering,Qatar","Electrical Engineering, Qatar University, Qatar"],"affiliations":[{"raw_affiliation_string":"Qatar University,Electrical Engineering,Qatar","institution_ids":["https://openalex.org/I60342839"]},{"raw_affiliation_string":"Electrical Engineering, Qatar University, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037234286","display_name":"Mohamed Abdallah","orcid":"https://orcid.org/0000-0002-3261-7588"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"M. Abdallah","raw_affiliation_strings":["College of Science and Engineering, HBKU,Qatar","College of Science and Engineering, HBKU, Qatar"],"affiliations":[{"raw_affiliation_string":"College of Science and Engineering, HBKU,Qatar","institution_ids":["https://openalex.org/I4210144839"]},{"raw_affiliation_string":"College of Science and Engineering, HBKU, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021329808","display_name":"Amr Mohamed","orcid":"https://orcid.org/0000-0002-1583-7503"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"A. Mohamed","raw_affiliation_strings":["Qatar University,Electrical Engineering,Qatar","Electrical Engineering, Qatar University, Qatar"],"affiliations":[{"raw_affiliation_string":"Qatar University,Electrical Engineering,Qatar","institution_ids":["https://openalex.org/I60342839"]},{"raw_affiliation_string":"Electrical Engineering, Qatar University, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5091344884"],"corresponding_institution_ids":["https://openalex.org/I4210105992"],"apc_list":null,"apc_paid":null,"fwci":0.5237,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70618655,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1644","last_page":"1648"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9693999886512756,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9290000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.834797739982605},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6683524250984192},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.6238648295402527},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5402045845985413},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.5192834734916687},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.49194619059562683},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3205300569534302},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07593923807144165}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.834797739982605},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6683524250984192},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.6238648295402527},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5402045845985413},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.5192834734916687},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.49194619059562683},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3205300569534302},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07593923807144165},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iwcmc58020.2023.10182790","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc58020.2023.10182790","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/57789","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/57789","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W1967649051","https://openalex.org/W3036524962","https://openalex.org/W4240977217","https://openalex.org/W2508088450","https://openalex.org/W4214750239","https://openalex.org/W2389434635","https://openalex.org/W4378628059","https://openalex.org/W4387171935"],"abstract_inverted_index":{"Despite":[0],"its":[1],"potential":[2,69],"benefits,":[3],"Federated":[4],"learning":[5],"(FL)":[6],"is":[7,82],"vulnerable":[8],"to":[9,32,45,63,87,112,192,220],"various":[10],"types":[11],"of":[12,21,75,126,132,155,181,197,216,242,254,265],"attacks":[13,236],"that":[14,59,134,199,229],"can":[15,237],"compromise":[16,122],"the":[17,22,73,99,104,124,130,135,153,156,165,168,173,179,182,186,194,202,210,214,217,222,230,240,243,250,255,261],"accuracy":[18,180,241,262],"and":[19,119,129,149,234,252,263],"security":[20,264],"trained":[23],"model.":[24,184,245],"While":[25],"several":[26],"defense":[27,90],"mechanisms":[28,91],"have":[29],"been":[30],"proposed":[31,79,159,218,231,256],"protect":[33],"FL":[34,100,266],"against":[35],"such":[36],"attacks,":[37],"attackers":[38,198],"are":[39,96],"continuously":[40],"developing":[41],"more":[42],"advanced":[43],"techniques":[44],"bypass":[46,88,201],"these":[47],"protection":[48],"mechanisms.In":[49],"this":[50,52],"context,":[51],"paper":[53],"proposes":[54],"a":[55,83,108,114,121],"novel":[56],"attack":[57,80,102,136,144,170,257],"mechanism":[58,258],"allows":[60],"malicious":[61],"users":[62],"optimize":[64,113],"their":[65],"crafted":[66],"reports,":[67],"maximizing":[68],"damage":[70,133],"while":[71,172],"limiting":[72],"chances":[74,125],"being":[76,127],"detected.":[77],"Our":[78,94],"technique":[81],"robust":[84],"approach":[85,111,219],"designed":[86],"existing":[89],"in":[92,259],"FL.":[93],"contributions":[95],"mainly":[97],"investigating":[98],"model":[101,109,224],"from":[103,167],"attacker\u2019s":[105],"perspective,":[106],"proposing":[107],"relaxation":[110],"single":[115],"poisoning":[116],"ratio":[117],"variable,":[118],"formulating":[120],"between":[123],"detected":[128],"amount":[131],"could":[137,200],"cause.":[138],"Additionally,":[139],"we":[140],"introduce":[141],"three":[142],"new":[143],"designs,":[145],"namely":[146],"DTA,":[147,232],"ATA,":[148,233],"NEA,":[150],"which":[151],"maximize":[152,193],"effect":[154],"attack.":[157],"The":[158,226],"Distance":[160],"Target":[161,175],"Attack":[162,176,189],"(DTA)":[163],"minimizes":[164],"distance":[166],"target":[169],"model,":[171],"Accuracy":[174],"(ATA)":[177],"deteriorates":[178],"global":[183,223,244],"Furthermore,":[185],"Number":[187],"Estimation":[188],"(NEA)":[190],"aims":[191],"expected":[195],"number":[196],"aggregation":[203],"detection":[204],"mechanisms.The":[205],"numerical":[206],"results":[207,247],"based":[208],"on":[209],"KDD":[211],"dataset":[212],"confirm":[213],"ability":[215],"deteriorate":[221],"accuracy.":[225],"experiments":[227],"showed":[228],"NEA":[235],"significantly":[238],"reduce":[239],"These":[246],"demonstrate":[248],"also":[249],"effectiveness":[251],"robustness":[253],"compromising":[260],"models.":[267]},"counts_by_year":[{"year":2024,"cited_by_count":3}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
