{"id":"https://openalex.org/W7125918004","doi":"https://doi.org/10.1109/smc58881.2025.11342890","title":"Fake Model Free-Rider Attacks in Federated Model Distillation","display_name":"Fake Model Free-Rider Attacks in Federated Model Distillation","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125918004","doi":"https://doi.org/10.1109/smc58881.2025.11342890"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11342890","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11342890","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060143640","display_name":"Kaushik Das","orcid":"https://orcid.org/0000-0002-6501-7896"},"institutions":[{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kaushik Amar Das","raw_affiliation_strings":["Institute of Information Technology,Department of Computer Science and Engineering,Guwahati"],"affiliations":[{"raw_affiliation_string":"Institute of Information Technology,Department of Computer Science and Engineering,Guwahati","institution_ids":["https://openalex.org/I4210089896"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047753580","display_name":"Ferdous Ahmed Barbhuiya","orcid":"https://orcid.org/0000-0001-8247-9171"},"institutions":[{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ferdous Ahmed Barbhuiya","raw_affiliation_strings":["Institute of Information Technology,Department of Computer Science and Engineering,Guwahati"],"affiliations":[{"raw_affiliation_string":"Institute of Information Technology,Department of Computer Science and Engineering,Guwahati","institution_ids":["https://openalex.org/I4210089896"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124116347","display_name":"Kuntal Dey","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kuntal Dey","raw_affiliation_strings":["Institute of Information Technology,Department of Computer Science and Engineering,Guwahati"],"affiliations":[{"raw_affiliation_string":"Institute of Information Technology,Department of Computer Science and Engineering,Guwahati","institution_ids":["https://openalex.org/I4210089896"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060143640"],"corresponding_institution_ids":["https://openalex.org/I4210089896"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.87004483,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2992","last_page":"2999"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8985000252723694,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8985000252723694,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.031099999323487282,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.006599999964237213,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6848000288009644},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6093000173568726},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5771999955177307},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.4936999976634979},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.44040000438690186},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.35109999775886536},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.3467999994754791}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7519000172615051},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6848000288009644},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6093000173568726},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5771999955177307},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.4936999976634979},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47839999198913574},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.44040000438690186},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.35109999775886536},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.3467999994754791},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33559998869895935},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30649998784065247},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3052999973297119},{"id":"https://openalex.org/C2779756789","wikidata":"https://www.wikidata.org/wiki/Q28549308","display_name":"Fake news","level":2,"score":0.3000999987125397},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.29910001158714294},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29589998722076416},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.28769999742507935},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2671999931335449},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.26600000262260437},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.25699999928474426}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11342890","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11342890","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6062997579574585}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W3187574650","https://openalex.org/W4283209436","https://openalex.org/W4283748449","https://openalex.org/W4312699393","https://openalex.org/W4313142254","https://openalex.org/W4381894846","https://openalex.org/W4385255201","https://openalex.org/W4386066428"],"related_works":[],"abstract_inverted_index":{"Federated":[0,63,81],"Learning":[1],"(FL)":[2],"has":[3],"made":[4],"it":[5],"possible":[6,16],"to":[7,18,45,72,94,128,138,161,177],"learn":[8],"from":[9,143],"data":[10],"that":[11,187],"would\u2019ve":[12],"otherwise":[13],"not":[14,86],"been":[15],"due":[17],"privacy":[19],"and":[20,30,157,171,216],"security":[21],"restrictions.":[22],"FL":[23,40,59,200],"relies":[24],"on":[25,109],"each":[26],"client\u2019s":[27],"honest":[28,51],"participation":[29],"contribution.":[31],"The":[32],"existence":[33],"of":[34,49,55,68,134,155,198,211,219],"free-rider":[35,70,136,148],"attackers":[36],"may":[37],"undermine":[38],"the":[39,43,47,50,66,69,74,132,135,140,144,151,163,195,199,209,212,217],"process":[41],"allowing":[42],"free-riders":[44,193],"enjoy":[46],"contributions":[48],"clients":[52,93],"without":[53],"any":[54],"their":[56],"own.":[57],"In":[58,119],"algorithms":[60,78],"such":[61,79,180,192],"as":[62,80],"Averaging":[64],"(FedAvg),":[65],"goal":[67,133],"is":[71,103,137],"obtain":[73],"global":[75,89],"model.":[76,90],"However,":[77],"Model":[82],"Distillation":[83],"(FedMD)":[84],"do":[85],"have":[87],"a":[88,110,116,124,173],"This":[91],"enables":[92],"train":[95],"models":[96,160],"with":[97],"unique":[98],"architectures.":[99],"Here,":[100,131],"collaborative":[101],"learning":[102],"done":[104],"by":[105,115],"sharing":[106],"prediction":[107,164],"logits":[108,142],"common":[111],"public":[112],"dataset":[113],"aggregated":[114,141],"central":[117],"server.":[118,145],"this":[120,129],"article,":[121],"we":[122,167,203],"propose":[123],"free-riding":[125],"attack":[126,149,215],"specific":[127],"scenario.":[130],"steal":[139],"Our":[146,184],"proposed":[147],"exploits":[150],"model":[152,182,214],"heterogeneity":[153],"property":[154],"FedMD":[156,170],"utilizes":[158],"fake":[159,181,213],"create":[162],"logits.":[165],"Furthermore,":[166],"improve":[168],"upon":[169],"develop":[172],"KL-divergence-based":[174],"detection":[175,221],"mechanism":[176,189],"defend":[178],"against":[179],"attacks.":[183],"experiments":[185],"show":[186],"our":[188,220],"can":[190],"remove":[191],"at":[194],"very":[196],"start":[197],"process.":[201],"Additionally,":[202],"also":[204],"provide":[205],"theoretical":[206],"justification":[207],"for":[208],"covertness":[210],"effectiveness":[218],"mechanism.":[222]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
