{"id":"https://openalex.org/W4415821177","doi":"https://doi.org/10.1109/tccn.2025.3627915","title":"Eliminating Stealthy Backdoors via Occupying and Withdrawing for Secure Personalized Federated Learning in UAV Swarms","display_name":"Eliminating Stealthy Backdoors via Occupying and Withdrawing for Secure Personalized Federated Learning in UAV Swarms","publication_year":2025,"publication_date":"2025-11-03","ids":{"openalex":"https://openalex.org/W4415821177","doi":"https://doi.org/10.1109/tccn.2025.3627915"},"language":null,"primary_location":{"id":"doi:10.1109/tccn.2025.3627915","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2025.3627915","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Bo Wang","orcid":"https://orcid.org/0009-0008-1267-5079"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bo Wang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R. China"],"raw_orcid":"https://orcid.org/0009-0008-1267-5079","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R. China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056148718","display_name":"Zan Zhou","orcid":"https://orcid.org/0000-0003-2388-2280"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zan Zhou","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R. China"],"raw_orcid":"https://orcid.org/0000-0003-2388-2280","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R. China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044191416","display_name":"Shujie Yang","orcid":"https://orcid.org/0000-0002-9597-2659"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shujie Yang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R. China"],"raw_orcid":"https://orcid.org/0000-0002-9597-2659","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R. China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100424999","display_name":"Ziwei Li","orcid":"https://orcid.org/0000-0002-7631-989X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziwei Li","raw_affiliation_strings":["School of Integrated Circuits, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Integrated Circuits, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104225330","display_name":"Xiangliang Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangliang Ma","raw_affiliation_strings":["School of Integrated Circuits, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Integrated Circuits, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069646989","display_name":"Changqiao Xu","orcid":"https://orcid.org/0000-0003-1467-1086"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changqiao Xu","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R. China"],"raw_orcid":"https://orcid.org/0000-0003-1467-1086","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, P.R. China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.4013901,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"2965","last_page":"2978"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.4724000096321106,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.4724000096321106,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.3084000051021576,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.09009999781847,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9922999739646912},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7684999704360962},{"id":"https://openalex.org/keywords/shadow","display_name":"Shadow (psychology)","score":0.492000013589859},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4025000035762787},{"id":"https://openalex.org/keywords/interdiction","display_name":"Interdiction","score":0.3553999960422516},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.34950000047683716},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.34060001373291016},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.3179999887943268}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9922999739646912},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.795799970626831},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7684999704360962},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6407999992370605},{"id":"https://openalex.org/C117797892","wikidata":"https://www.wikidata.org/wiki/Q286363","display_name":"Shadow (psychology)","level":2,"score":0.492000013589859},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4025000035762787},{"id":"https://openalex.org/C124119293","wikidata":"https://www.wikidata.org/wiki/Q6046081","display_name":"Interdiction","level":2,"score":0.3553999960422516},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.34950000047683716},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.34060001373291016},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.3179999887943268},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.3059000074863434},{"id":"https://openalex.org/C2776196576","wikidata":"https://www.wikidata.org/wiki/Q196113","display_name":"Camouflage","level":2,"score":0.3057999908924103},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2930000126361847},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.2858999967575073},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.28139999508857727},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28110000491142273},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26910001039505005},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C63222358","wikidata":"https://www.wikidata.org/wiki/Q6120337","display_name":"chEMBL","level":3,"score":0.25839999318122864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2572000026702881},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tccn.2025.3627915","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2025.3627915","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3564288279","display_name":null,"funder_award_id":"62401075","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5692104327","display_name":null,"funder_award_id":"62394322","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G645602424","display_name":null,"funder_award_id":"2024YFC3015300","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2934843808","https://openalex.org/W3133982043","https://openalex.org/W3138597937","https://openalex.org/W3175919946","https://openalex.org/W3189812816","https://openalex.org/W4382237486","https://openalex.org/W4382463479","https://openalex.org/W4382469137","https://openalex.org/W4385679845","https://openalex.org/W4388867373","https://openalex.org/W4390659346","https://openalex.org/W4390874361","https://openalex.org/W4391579468","https://openalex.org/W4391724779","https://openalex.org/W4393156872","https://openalex.org/W4393973474","https://openalex.org/W4399374631","https://openalex.org/W4401023895","https://openalex.org/W4401326346","https://openalex.org/W4402683911","https://openalex.org/W4402716118","https://openalex.org/W4404952803","https://openalex.org/W4405838426","https://openalex.org/W4406158057","https://openalex.org/W4406754674","https://openalex.org/W4408520320","https://openalex.org/W4408565892","https://openalex.org/W4411358654","https://openalex.org/W4411635489","https://openalex.org/W4414463166","https://openalex.org/W4415796244"],"related_works":[],"abstract_inverted_index":{"The":[0,89],"rapid":[1],"emergence":[2],"of":[3,12,42,92,203],"the":[4,9,39,84,97,104,198,204],"Low-Altitude":[5,206],"Economy":[6],"has":[7],"driven":[8],"large-scale":[10],"deployment":[11],"unmanned":[13],"aerial":[14],"vehicle":[15],"(UAV)":[16],"swarms,":[17],"where":[18],"Personalized":[19],"Federated":[20],"Learning":[21],"(PFL)":[22],"serves":[23],"as":[24],"a":[25,77],"promising":[26],"paradigm":[27],"to":[28,48,66,95,121,149],"enable":[29],"intelligent":[30],"and":[31,86,117,157,164,200],"privacy-preserving":[32],"model":[33,55],"training":[34],"across":[35],"heterogeneous":[36],"UAVs.":[37],"However,":[38],"decentralized":[40],"structure":[41],"PFL":[43,162,189],"also":[44],"exposes":[45],"UAV":[46,67,112,191],"swarms":[47,192],"stealthy":[49,151,166],"backdoor":[50,79,101,167,194],"attacks,":[51,195],"which":[52,126],"can":[53],"manipulate":[54],"predictions":[56],"without":[57],"degrading":[58],"main-task":[59,183],"accuracy,":[60],"thereby":[61,196],"posing":[62],"severe":[63],"safety":[64,201],"risks":[65],"swarms.":[68],"To":[69],"address":[70],"this":[71,73],"challenge,":[72],"paper":[74],"proposes":[75],"PFL-OW,":[76],"novel":[78],"elimination":[80],"mothod":[81],"grounded":[82],"in":[83,176,190],"Occupying":[85,108],"Withdrawing":[87,137],"mechanism.":[88],"core":[90],"idea":[91],"PFL-OW":[93,171],"is":[94,141],"exploit":[96],"inherent":[98],"correlation":[99],"between":[100],"attacks":[102,168],"targeting":[103],"same":[105],"class.":[106],"In":[107,136],"phase,":[109,138],"each":[110],"benign":[111],"constructs":[113],"class-wise":[114],"shadow":[115,147],"datasets":[116],"injects":[118],"deliberate":[119],"backdoors":[120],"observe":[122],"update":[123],"divergence,":[124],"through":[125],"suspicious":[127],"target":[128],"classes":[129,145],"are":[130],"identified":[131],"using":[132],"Local":[133],"Outlier":[134],"Factor.":[135],"reversed":[139],"learning":[140],"performed":[142],"on":[143,155],"these":[144],"with":[146],"dataset":[148],"eliminate":[150],"backdoors.":[152],"Extensive":[153],"experiments":[154],"MNIST":[156],"FashionMNIST":[158],"under":[159],"five":[160,165],"representative":[161],"frameworks":[163],"demonstrate":[169],"that":[170],"achieves":[172],"superior":[173],"defensive":[174],"performance":[175],"attack":[177],"success":[178],"rate":[179],"while":[180],"maintaining":[181],"competitive":[182],"accuracy.":[184],"This":[185],"work":[186],"ensures":[187],"secure":[188],"against":[193],"reinforcing":[197],"reliability":[199],"foundations":[202],"emerging":[205],"Economy.":[207]},"counts_by_year":[],"updated_date":"2026-01-01T23:40:50.289205","created_date":"2025-11-03T00:00:00"}
