{"id":"https://openalex.org/W4402897108","doi":"https://doi.org/10.1109/iwqos61813.2024.10682906","title":"FedTrojan: Corrupting Federated Learning via Zero-Knowledge Federated Trojan Attacks","display_name":"FedTrojan: Corrupting Federated Learning via Zero-Knowledge Federated Trojan Attacks","publication_year":2024,"publication_date":"2024-06-19","ids":{"openalex":"https://openalex.org/W4402897108","doi":"https://doi.org/10.1109/iwqos61813.2024.10682906"},"language":"en","primary_location":{"id":"doi:10.1109/iwqos61813.2024.10682906","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwqos61813.2024.10682906","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013173652","display_name":"Shan Chang","orcid":"https://orcid.org/0000-0002-5253-2549"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shan Chang","raw_affiliation_strings":["Donghua University,China"],"affiliations":[{"raw_affiliation_string":"Donghua University,China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100346528","display_name":"Ye Liu","orcid":"https://orcid.org/0000-0001-6709-3721"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Liu","raw_affiliation_strings":["Donghua University,China"],"affiliations":[{"raw_affiliation_string":"Donghua University,China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068003168","display_name":"Zhijian Lin","orcid":"https://orcid.org/0000-0001-5092-068X"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhijian Lin","raw_affiliation_strings":["Donghua University,China"],"affiliations":[{"raw_affiliation_string":"Donghua University,China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071050711","display_name":"Hongzi Zhu","orcid":"https://orcid.org/0000-0001-8657-5064"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongzi Zhu","raw_affiliation_strings":["Shanghai Jiao Tong University,China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113404351","display_name":"Bingzhu Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingzhu Zhu","raw_affiliation_strings":["Donghua University,China"],"affiliations":[{"raw_affiliation_string":"Donghua University,China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100390514","display_name":"Cong Wang","orcid":"https://orcid.org/0000-0003-0547-315X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Cong Wang","raw_affiliation_strings":["City University of Hong Kong,Hong Kong"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong,Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5013173652"],"corresponding_institution_ids":["https://openalex.org/I181326427"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16577335,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"34","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.8466854691505432},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7262659668922424},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.6431370973587036},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.49112293124198914},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4431280493736267},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23270156979560852}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.8466854691505432},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7262659668922424},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.6431370973587036},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.49112293124198914},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4431280493736267},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23270156979560852},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwqos61813.2024.10682906","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwqos61813.2024.10682906","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2112796928","https://openalex.org/W2194775991","https://openalex.org/W2753783305","https://openalex.org/W2934843808","https://openalex.org/W2985913519","https://openalex.org/W2986013765","https://openalex.org/W3004155269","https://openalex.org/W3011711630","https://openalex.org/W3083185154","https://openalex.org/W3106646114","https://openalex.org/W3138597937","https://openalex.org/W3204548896","https://openalex.org/W4213446860","https://openalex.org/W4214564822","https://openalex.org/W4252654521","https://openalex.org/W4283702393","https://openalex.org/W4316661314","https://openalex.org/W4372263302","https://openalex.org/W4386766438","https://openalex.org/W4387359750","https://openalex.org/W6607826182","https://openalex.org/W6728757088","https://openalex.org/W6743581629","https://openalex.org/W6743821447","https://openalex.org/W6746897123","https://openalex.org/W6752600739","https://openalex.org/W6754708698","https://openalex.org/W6756840679","https://openalex.org/W6770634426","https://openalex.org/W6770897281","https://openalex.org/W6771533808","https://openalex.org/W6776469819","https://openalex.org/W6784747331","https://openalex.org/W6786190006","https://openalex.org/W6787972765","https://openalex.org/W6803329705"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4253721122","https://openalex.org/W1671033612","https://openalex.org/W4389527383","https://openalex.org/W4206524843","https://openalex.org/W2139923244","https://openalex.org/W2237899707","https://openalex.org/W576137284","https://openalex.org/W2952570804"],"abstract_inverted_index":{"Decentralized":[0],"and":[1,32,51,67,74,77,116,162,201],"open":[2],"features":[3,150,165],"of":[4,54,64,79,170,176,185,192],"federated":[5,94],"learning":[6,19],"provides":[7],"opportunities":[8],"for":[9],"malicious":[10],"participants":[11],"to":[12,28,69,84,159,166],"inject":[13],"stealthy":[14],"trojan":[15,24,95,137,172,194],"functionality":[16],"into":[17,134],"deep":[18],"models":[20,121],"collusively.":[21],"A":[22],"successful":[23],"attack":[25],"is":[26,187],"desired":[27],"be":[29,85,132,140],"effective,":[30],"precise":[31],"imperceptible,":[33],"which":[34,138],"generally":[35],"requires":[36],"priori":[37],"knowledge":[38,66],"such":[39],"as":[40,155],"aggregation":[41,203],"rules,":[42],"tight":[43],"cooperation":[44],"between":[45],"attackers,":[46],"e.g.":[47],"sharing":[48],"data":[49],"distributions,":[50],"the":[52,65,125,128,143,168,183,198],"use":[53],"inconspicuous":[55],"triggers.":[56],"However,":[57],"in":[58],"realistic,":[59],"attackers":[60],"are":[61,82,122],"typically":[62],"lack":[63],"hardly":[68],"fully":[70],"cooperate":[71],"(for":[72],"privacy":[73],"efficiency":[75],"reasons),":[76],"out":[78],"scope":[80],"triggers":[81,158,173],"easy":[83],"detected":[86],"by":[87,142],"scanners.":[88],"We":[89,146],"propose":[90],"FedTrojan,":[91],"a":[92,101,106,135],"zero-knowledge":[93],"attack.":[96],"Each":[97],"attacker":[98],"independently":[99],"trains":[100],"quasi-trojaned":[102],"local":[103,120,157,171],"model":[104,110],"with":[105],"self-select":[107],"trigger.":[108,145],"The":[109],"behaves":[111],"normally":[112],"on":[113,124,174],"both":[114,197],"regular":[115],"trojaned":[117],"inputs.":[118],"When":[119],"aggregated":[123],"server":[126],"side,":[127],"corresponding":[129],"quasi-trojans":[130],"will":[131],"assembled":[133],"complete":[136],"can":[139],"activated":[141],"global":[144],"choose":[147],"existing":[148,193],"benign":[149],"rather":[151],"than":[152,190],"artificial":[153],"patches":[154],"hidden":[156],"guarantee":[160],"imperceptibility,":[161],"introduce":[163],"catalytic":[164],"eliminate":[167],"impact":[169],"behaviors":[175],"local/global":[177],"models.":[178],"Extensive":[179],"experiments":[180],"show":[181],"that":[182,191],"performance":[184],"FedTrojan":[186],"significantly":[188],"better":[189],"attacks":[195],"under":[196],"classic":[199],"FedAvg":[200],"Byzantine-robust":[202],"rules.":[204]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
