{"id":"https://openalex.org/W4415744211","doi":"https://doi.org/10.1109/qrs-c65679.2025.00072","title":"A Defense Scheme of Backdoor Attacks for Federated Learning Based on Multi-Index Cascading","display_name":"A Defense Scheme of Backdoor Attacks for Federated Learning Based on Multi-Index Cascading","publication_year":2025,"publication_date":"2025-07-16","ids":{"openalex":"https://openalex.org/W4415744211","doi":"https://doi.org/10.1109/qrs-c65679.2025.00072"},"language":null,"primary_location":{"id":"doi:10.1109/qrs-c65679.2025.00072","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00072","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103071856","display_name":"Jingjing Guo","orcid":"https://orcid.org/0000-0001-6280-896X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingjing Guo","raw_affiliation_strings":["Xidian University,School of Cyber Engineering,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xidian University,School of Cyber Engineering,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116420483","display_name":"Yupeng Xiong","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yupeng Xiong","raw_affiliation_strings":["Xidian University,School of Cyber Engineering,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xidian University,School of Cyber Engineering,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102962718","display_name":"Lixiang Wu","orcid":"https://orcid.org/0000-0003-0571-454X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lixiang Wu","raw_affiliation_strings":["Xidian University,School of Cyber Engineering,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xidian University,School of Cyber Engineering,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101958555","display_name":"Kun Dong","orcid":"https://orcid.org/0000-0002-5440-185X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun Dong","raw_affiliation_strings":["Xidian University,School of Microelectronics,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xidian University,School of Microelectronics,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":null,"display_name":"Lidong Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I4210147760","display_name":"Wuhu Institute of Technology","ror":"https://ror.org/055hnk386","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210147760"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lidong Lee","raw_affiliation_strings":["SourceGuard Technology Ltd,Wuhu,China"],"affiliations":[{"raw_affiliation_string":"SourceGuard Technology Ltd,Wuhu,China","institution_ids":["https://openalex.org/I4210147760"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103071856"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16333097,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"540","last_page":"549"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.6338000297546387,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.6338000297546387,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.2791999876499176,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.012299999594688416,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9940000176429749},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5831999778747559},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5663999915122986},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5185999870300293},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.48809999227523804},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46619999408721924},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4180999994277954}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9940000176429749},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.723800003528595},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5831999778747559},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5663999915122986},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5185999870300293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5174000263214111},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.48809999227523804},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46619999408721924},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4180999994277954},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.36559998989105225},{"id":"https://openalex.org/C50962388","wikidata":"https://www.wikidata.org/wiki/Q762018","display_name":"Invisibility","level":2,"score":0.3431999981403351},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.30630001425743103},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2912999987602234},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.2768000066280365},{"id":"https://openalex.org/C141513077","wikidata":"https://www.wikidata.org/wiki/Q378542","display_name":"Independent and identically distributed random variables","level":3,"score":0.27250000834465027},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26660001277923584},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.25870001316070557},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.2583000063896179},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.2533000111579895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/qrs-c65679.2025.00072","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00072","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2965921687","https://openalex.org/W2995022099","https://openalex.org/W3138597937","https://openalex.org/W4213446860","https://openalex.org/W4226047321","https://openalex.org/W4283705679","https://openalex.org/W4290948380","https://openalex.org/W4295806247","https://openalex.org/W4324291205","https://openalex.org/W4382051836","https://openalex.org/W4382203046","https://openalex.org/W4382237486","https://openalex.org/W4385573125","https://openalex.org/W4387332191","https://openalex.org/W4390691907","https://openalex.org/W4391620892","https://openalex.org/W4403938208"],"related_works":[],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"enables":[3],"collaborative":[4],"training":[5,36],"among":[6],"multiple":[7],"data":[8,91,128],"owners":[9],"without":[10],"direct":[11],"sharing":[12],"of":[13,33,84,90,166,191,218],"users\u2019":[14],"local":[15,34,175],"data,":[16],"which":[17],"not":[18],"only":[19],"protects":[20],"user":[21],"privacy":[22],"but":[23],"also":[24],"enhances":[25],"model":[26,35,68,167],"performance.":[27],"However,":[28],"due":[29],"to":[30,38,45,61,67,77],"the":[31,39,81,87,203,215,219],"invisibility":[32],"processes":[37],"aggregation":[40],"server,":[41],"FL":[42],"is":[43],"vulnerable":[44],"Byzantine":[46],"attacks":[47,50,55,144],"and":[48,59,86,124,177,194],"backdoor":[49,71,143,196],"initiated":[51],"by":[52],"adversaries.":[53],"Backdoor":[54],"are":[56],"highly":[57,111],"covert":[58],"difficult":[60],"detect,":[62],"thus":[63],"posing":[64],"significant":[65],"threats":[66],"security.":[69],"Current":[70],"attack":[72],"defense":[73,99,140],"mechanisms":[74],"frequently":[75],"fail":[76],"adequately":[78],"account":[79],"for":[80],"sophisticated":[82,210],"capabilities":[83],"adversaries":[85],"heterogeneous":[88],"nature":[89],"distributions":[92],"encountered":[93],"in":[94,145],"practical":[95],"deployment":[96],"environments.":[97],"Conventional":[98],"approaches":[100],"relying":[101],"on":[102],"singular":[103],"evaluation":[104,159],"metrics":[105,160],"exhibit":[106],"notable":[107],"limitations":[108],"when":[109],"confronting":[110],"self-adaptive":[112],"adversarial":[113,211],"attacks,":[114],"with":[115],"their":[116],"defensive":[117],"efficacy":[118,208],"being":[119],"particularly":[120],"compromised":[121],"under":[122],"non-independent":[123],"identically":[125],"distributed":[126,174],"(Non-IID)":[127],"conditions.":[129],"To":[130],"overcome":[131],"these":[132],"limitations,":[133],"we":[134],"present":[135],"a":[136],"novel":[137],"multi-metric":[138],"cascading":[139],"framework":[141,187],"against":[142,209],"federated":[146],"learning":[147],"systems.":[148],"The":[149],"proposed":[150,204],"methodology":[151],"systematically":[152],"integrates":[153],"five":[154],"complementary":[155],"yet":[156],"mutually":[157],"constraining":[158],"that":[161,202],"collectively":[162],"capture":[163],"different":[164],"aspects":[165],"behavior.":[168],"Through":[169],"layer-wise":[170],"feature":[171],"extraction":[172],"from":[173],"models":[176],"adaptive":[178,195],"threshold":[179],"determination":[180],"via":[181],"rigorous":[182],"statistical":[183],"hypothesis":[184],"testing,":[185],"our":[186],"achieves":[188],"robust":[189],"detection":[190,207],"both":[192],"static":[193],"attacks.":[197],"Comprehensive":[198],"experimental":[199],"evaluations":[200],"confirm":[201],"solution":[205],"maintains":[206],"strategies":[212],"while":[213],"preserving":[214],"baseline":[216],"accuracy":[217],"global":[220],"model.":[221]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-31T00:00:00"}
