{"id":"https://openalex.org/W4390904993","doi":"https://doi.org/10.1109/tdsc.2024.3354736","title":"Efficient and Secure Federated Learning Against Backdoor Attacks","display_name":"Efficient and Secure Federated Learning Against Backdoor Attacks","publication_year":2024,"publication_date":"2024-01-16","ids":{"openalex":"https://openalex.org/W4390904993","doi":"https://doi.org/10.1109/tdsc.2024.3354736"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3354736","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3354736","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102885964","display_name":"Yinbin Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yinbin Miao","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xian, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xian, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081473987","display_name":"Rongpeng Xie","orcid":"https://orcid.org/0000-0001-5506-0367"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rongpeng Xie","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xian, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xian, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100626958","display_name":"Xinghua Li","orcid":"https://orcid.org/0000-0002-5583-4155"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinghua Li","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xian, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xian, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062494507","display_name":"Zhiquan Liu","orcid":"https://orcid.org/0000-0002-3934-2177"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiquan Liu","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, Guangdong, China","Cyberdataforce (Beijing) Technology Ltd, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"Cyberdataforce (Beijing) Technology Ltd, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001712801","display_name":"Robert H. Deng","orcid":"https://orcid.org/0000-0003-3491-8146"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Robert H. Deng","raw_affiliation_strings":["School of Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102885964"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":20.3068,"has_fulltext":false,"cited_by_count":59,"citation_normalized_percentile":{"value":0.99525147,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"21","issue":"5","first_page":"4619","last_page":"4636"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.7536779642105103},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6168026328086853},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4948217272758484},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41184067726135254},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3240889608860016},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22225308418273926}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.7536779642105103},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6168026328086853},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4948217272758484},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41184067726135254},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3240889608860016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22225308418273926}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2024.3354736","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3354736","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-9663","is_oa":false,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/8660","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TDSC.2024.3354736","raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1819083007","display_name":null,"funder_award_id":"62125205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3313943221","display_name":null,"funder_award_id":"QTZX23091","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G4365675440","display_name":null,"funder_award_id":"U23A20303","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G576546066","display_name":null,"funder_award_id":"61932010","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6921191723","display_name":null,"funder_award_id":"2022GY-019","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G7356091226","display_name":null,"funder_award_id":"62272195","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1821462560","https://openalex.org/W2104266187","https://openalex.org/W2194775991","https://openalex.org/W2469490737","https://openalex.org/W2473418344","https://openalex.org/W2781091734","https://openalex.org/W3010216907","https://openalex.org/W3047380981","https://openalex.org/W3081130510","https://openalex.org/W3087391814","https://openalex.org/W3106047871","https://openalex.org/W3135434750","https://openalex.org/W3138153888","https://openalex.org/W3138597937","https://openalex.org/W3154581591","https://openalex.org/W3189812816","https://openalex.org/W3192324887","https://openalex.org/W3209752568","https://openalex.org/W4226021524","https://openalex.org/W4283214572","https://openalex.org/W4287977550","https://openalex.org/W4288057793","https://openalex.org/W4295308234","https://openalex.org/W4298221930","https://openalex.org/W4311166015","https://openalex.org/W6638523607","https://openalex.org/W6685891324","https://openalex.org/W6720242923","https://openalex.org/W6728757088","https://openalex.org/W6739917289","https://openalex.org/W6743821447","https://openalex.org/W6746720608","https://openalex.org/W6748786018","https://openalex.org/W6752600739","https://openalex.org/W6756840679","https://openalex.org/W6764838729","https://openalex.org/W6770634426","https://openalex.org/W6771533808","https://openalex.org/W6772265129","https://openalex.org/W6773640337","https://openalex.org/W6780640148","https://openalex.org/W6838899697","https://openalex.org/W7056673059"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292"],"abstract_inverted_index":{"Due":[0],"to":[1,50,76,87,91],"the":[2,77,92,155,171],"powerful":[3],"representation":[4],"ability":[5],"and":[6,27,83,107,129,168],"superior":[7],"performance":[8],"of":[9,69,79,81,157,165],"Deep":[10],"Neural":[11],"Networks":[12],"(DNN),":[13],"Federated":[14],"Learning":[15],"(FL)":[16],"based":[17,39],"on":[18,40],"DNN":[19,63],"has":[20],"attracted":[21],"much":[22],"attention":[23],"from":[24],"both":[25],"academic":[26],"industrial":[28],"fields.":[29],"However,":[30],"its":[31],"transmitted":[32],"plaintext":[33],"data":[34],"causes":[35],"privacy":[36,48],"disclosure.":[37],"FL":[38,160],"Local":[41],"Differential":[42],"Privacy":[43],"(LDP)":[44],"solutions":[45,56],"can":[46,153],"provide":[47],"protection":[49],"a":[51,163],"certain":[52],"extent,":[53],"but":[54],"these":[55,98],"still":[57],"cannot":[58],"achieve":[59],"adaptive":[60,127],"perturbation":[61],"in":[62],"model.":[64],"In":[65],"addition,":[66],"this":[67],"kind":[68],"schemes":[70,161],"cause":[71],"high":[72],"communication":[73],"overheads":[74],"due":[75,90],"curse":[78],"dimensionality":[80],"DNN,":[82],"are":[84],"naturally":[85],"vulnerable":[86],"backdoor":[88,123,172],"attacks":[89,124],"inherent":[93],"distributed":[94],"characteristic.":[95],"To":[96],"solve":[97,154],"issues,":[99],"we":[100],"propose":[101],"an":[102],"<underline":[103,108,112,116],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[104,109,113,117,140],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">E</u>":[105],"fficient":[106],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">S</u>":[110],"ecure":[111],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">F</u>":[114],"ederated":[115],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">L</u>":[118],"earning":[119],"scheme":[120],"(ESFL)":[121],"against":[122],"by":[125],"using":[126,147],"LDP":[128],"compressive":[130],"sensing.":[131],"Formal":[132],"security":[133],"analysis":[134],"proves":[135],"that":[136,151],"ESFL":[137,152],"satisfies":[138],"<inline-formula":[139],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[141],"notation=\"LaTeX\">$\\epsilon$</tex-math></inline-formula>":[142],"-LDP":[143],"security.":[144],"Extensive":[145],"experiments":[146],"three":[148],"datasets":[149],"demonstrate":[150],"problems":[156],"traditional":[158],"LDP-based":[159],"without":[162],"loss":[164],"model":[166],"accuracy":[167],"efficiently":[169],"resist":[170],"attacks.":[173]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":47},{"year":2024,"cited_by_count":5}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
