{"id":"https://openalex.org/W4401687264","doi":"https://doi.org/10.1109/tdsc.2024.3445637","title":"CoBA: Collusive Backdoor Attacks With Optimized Trigger to Federated Learning","display_name":"CoBA: Collusive Backdoor Attacks With Optimized Trigger to Federated Learning","publication_year":2024,"publication_date":"2024-08-19","ids":{"openalex":"https://openalex.org/W4401687264","doi":"https://doi.org/10.1109/tdsc.2024.3445637"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3445637","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3445637","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://inria.hal.science/hal-04829828","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075844359","display_name":"Xiaoting Lyu","orcid":"https://orcid.org/0000-0003-0732-0261"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoting Lyu","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yufei Han","orcid":"https://orcid.org/0000-0002-9035-6718"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en sciences et technologies du num\u00e9rique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I4210133778","display_name":"Centre Inria de l'Universit\u00e9 de Rennes","ror":"https://ror.org/04040yw90","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210133778"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Yufei Han","raw_affiliation_strings":["INRIA, Rennes, Bretagne, France","INRIA, Bretagne, Rennes, France"],"affiliations":[{"raw_affiliation_string":"INRIA, Rennes, Bretagne, France","institution_ids":["https://openalex.org/I4210133778","https://openalex.org/I1326498283"]},{"raw_affiliation_string":"INRIA, Bretagne, Rennes, France","institution_ids":["https://openalex.org/I4210133778","https://openalex.org/I1326498283"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100777576","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-5974-1589"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067865967","display_name":"Jingkai Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingkai Liu","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108156794","display_name":"Bin Wang","orcid":"https://orcid.org/0000-0002-3790-2708"},"institutions":[{"id":"https://openalex.org/I4210123185","display_name":"Zhejiang Lab","ror":"https://ror.org/02m2h7991","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210123185"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Wang","raw_affiliation_strings":["Zhejiang Key Laboratory of Artificial Intelligence of Things (AIoT) Network and Data Security, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang Key Laboratory of Artificial Intelligence of Things (AIoT) Network and Data Security, Hangzhou, China","institution_ids":["https://openalex.org/I4210123185"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100437976","display_name":"Kai Chen","orcid":"https://orcid.org/0000-0002-5624-2987"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Chen","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010019122","display_name":"Yidong Li","orcid":"https://orcid.org/0000-0003-2965-6196"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yidong Li","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070828650","display_name":"Jiqiang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiqiang Liu","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000755750","display_name":"Xiangliang Zhang","orcid":"https://orcid.org/0000-0002-3574-5665"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiangliang Zhang","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN, USA","Department of Computer Science and Engineering, The University of Notre Dame, Notre Dame, IN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN, USA","institution_ids":["https://openalex.org/I107639228"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, The University of Notre Dame, Notre Dame, IN, USA","institution_ids":["https://openalex.org/I107639228"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5075844359"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":4.4396,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.95119391,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"22","issue":"2","first_page":"1506","last_page":"1518"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.987661600112915},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.74662184715271},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6205317974090576},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.5132079124450684},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15075871348381042},{"id":"https://openalex.org/keywords/industrial-organization","display_name":"Industrial organization","score":0.1277773380279541}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.987661600112915},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74662184715271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6205317974090576},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.5132079124450684},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15075871348381042},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.1277773380279541}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2024.3445637","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3445637","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-04829828v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-04829828","pdf_url":null,"source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing, 2024, pp.1-12. &#x27E8;10.1109/TDSC.2024.3445637&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-04829828v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-04829828","pdf_url":null,"source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing, 2024, pp.1-12. &#x27E8;10.1109/TDSC.2024.3445637&#x27E9;","raw_type":"Journal articles"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1905834040","display_name":null,"funder_award_id":"L221014","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"}],"funders":[{"id":"https://openalex.org/F4320322919","display_name":"Natural Science Foundation of Beijing Municipality","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W151377110","https://openalex.org/W2112796928","https://openalex.org/W2560647685","https://openalex.org/W2990595670","https://openalex.org/W3127520698","https://openalex.org/W3128515475","https://openalex.org/W3138153888","https://openalex.org/W3138597937","https://openalex.org/W3204548896","https://openalex.org/W4213446860","https://openalex.org/W4221129260","https://openalex.org/W4290948380","https://openalex.org/W4312996082","https://openalex.org/W4382237486","https://openalex.org/W4387665621","https://openalex.org/W4389879917","https://openalex.org/W4389890871","https://openalex.org/W4399262514","https://openalex.org/W6743688258","https://openalex.org/W6743821447","https://openalex.org/W6746720608","https://openalex.org/W6748786018","https://openalex.org/W6748805329","https://openalex.org/W6752600739","https://openalex.org/W6754708698","https://openalex.org/W6758201434","https://openalex.org/W6758684365","https://openalex.org/W6771533808","https://openalex.org/W6780640148","https://openalex.org/W6787972765","https://openalex.org/W6799246147","https://openalex.org/W6803163835","https://openalex.org/W6839074529","https://openalex.org/W6869404756","https://openalex.org/W7056673059"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W4401407399","https://openalex.org/W1571731735"],"abstract_inverted_index":{"Considerable":[0],"efforts":[1],"have":[2],"been":[3,19],"devoted":[4],"to":[5,102,115,166],"addressing":[6],"distributed":[7],"backdoor":[8,50,109,119,168],"attacks":[9,51,110],"in":[10,21,211],"federated":[11],"learning":[12,117],"(FL)":[13],"systems.":[14],"While":[15],"significant":[16],"progress":[17],"has":[18],"made":[20],"enhancing":[22],"the":[23,53,104,123,132,148,199,205],"security":[24,38],"of":[25,37,108,118,125,201],"FL":[26,54,202],"systems,":[27],"our":[28],"study":[29],"reveals":[30],"that":[31,43],"there":[32],"remains":[33],"a":[34,72,83],"false":[35],"sense":[36],"surrounding":[39],"FL.":[40],"We":[41],"demonstrate":[42],"colluding":[44],"malicious":[45,126],"participants":[46],"can":[47,65,183],"effectively":[48],"execute":[49],"during":[52],"training":[55,120],"process,":[56],"exhibiting":[57],"high":[58],"sparsity":[59,105],"and":[60,106,130,178,203],"stealthiness,":[61],"which":[62],"means":[63],"they":[64],"evade":[66],"common":[67],"defense":[68,159],"methods":[69,160],"with":[70],"only":[71],"few":[73],"attack":[74,176,191],"iterations.":[75,192],"Our":[76],"research":[77],"highlights":[78],"this":[79],"vulnerability":[80],"by":[81,111],"proposing":[82],"<bold":[84,87,90],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[85,88,91,95,98,153,171,181],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Co</b>llusive":[86],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">B</b>ackdoor":[89],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">A</b>ttack":[92],"named":[93],"<italic":[94,97,152,170,180],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">CoBA</i>.":[96],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">CoBA</i>":[99,154,172,182],"is":[100],"designed":[101],"enhance":[103],"stealthiness":[107],"offering":[112],"trigger":[113],"tuning":[114],"facilitate":[116],"data,":[121],"controlling":[122],"bias":[124],"local":[127],"model":[128],"updates,":[129],"applying":[131],"projected":[133],"gradient":[134],"descent":[135],"technique.":[136],"By":[137],"conducting":[138],"extensive":[139],"empirical":[140],"studies":[141],"on":[142],"5":[143],"benchmark":[144],"datasets,":[145],"we":[146],"make":[147],"following":[149],"observations:":[150],"1)":[151],"successfully":[155],"circumvents":[156],"15":[157],"state-of-the-art":[158],"for":[161,208],"robust":[162],"FL;":[163],"2)":[164],"Compared":[165],"existing":[167],"attacks,":[169],"consistently":[173],"achieves":[174],"superior":[175],"performance;":[177],"3)":[179],"achieve":[184],"persistent":[185],"poisoning":[186],"effects":[187],"through":[188],"significantly":[189],"sparse":[190],"These":[193],"findings":[194],"raise":[195],"substantial":[196],"concerns":[197],"regarding":[198],"integrity":[200],"underscore":[204],"urgent":[206],"need":[207],"heightened":[209],"vigilance":[210],"defending":[212],"against":[213],"such":[214],"attacks.":[215]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
