{"id":"https://openalex.org/W4412722297","doi":"https://doi.org/10.1109/tdsc.2025.3593640","title":"SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning","display_name":"SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning","publication_year":2025,"publication_date":"2025-07-29","ids":{"openalex":"https://openalex.org/W4412722297","doi":"https://doi.org/10.1109/tdsc.2025.3593640"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3593640","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3593640","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/tdsc.2025.3593640","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112845861","display_name":"Minyeong Choe","orcid":null},"institutions":[{"id":"https://openalex.org/I152238500","display_name":"Chosun University","ror":"https://ror.org/01zt9a375","country_code":"KR","type":"education","lineage":["https://openalex.org/I152238500"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Minyeong Choe","raw_affiliation_strings":["Department of Information and Communication Engineering, Major in Information Security, Chosun University, Gwangju, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Engineering, Major in Information Security, Chosun University, Gwangju, South Korea","institution_ids":["https://openalex.org/I152238500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021047372","display_name":"Cheol-Hee Park","orcid":"https://orcid.org/0000-0002-3637-9951"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Cheolhee Park","raw_affiliation_strings":["AI Data Security Research Section, Electronics and Telecommunications Research Institute, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"AI Data Security Research Section, Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010473957","display_name":"Changho Seo","orcid":"https://orcid.org/0000-0002-0779-3539"},"institutions":[{"id":"https://openalex.org/I206597221","display_name":"Kongju National University","ror":"https://ror.org/0373nm262","country_code":"KR","type":"education","lineage":["https://openalex.org/I206597221"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Changho Seo","raw_affiliation_strings":["Department of Convergence Science, Kongju National University, Gongju, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Convergence Science, Kongju National University, Gongju, South Korea","institution_ids":["https://openalex.org/I206597221"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101568462","display_name":"Hyunil Kim","orcid":"https://orcid.org/0000-0002-4018-4540"},"institutions":[{"id":"https://openalex.org/I152238500","display_name":"Chosun University","ror":"https://ror.org/01zt9a375","country_code":"KR","type":"education","lineage":["https://openalex.org/I152238500"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyunil Kim","raw_affiliation_strings":["Department of Artificial Intelligence and Software Engineering, Major in Information Security, Chosun University, Gwangju, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence and Software Engineering, Major in Information Security, Chosun University, Gwangju, South Korea","institution_ids":["https://openalex.org/I152238500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5112845861"],"corresponding_institution_ids":["https://openalex.org/I152238500"],"apc_list":null,"apc_paid":null,"fwci":5.2067,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.95354826,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"22","issue":"6","first_page":"6929","last_page":"6942"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9809426069259644},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6296162605285645},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5695444941520691}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9809426069259644},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6296162605285645},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5695444941520691}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3593640","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3593640","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tdsc.2025.3593640","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3593640","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1910131649","https://openalex.org/W2019759670","https://openalex.org/W2064675550","https://openalex.org/W2120510885","https://openalex.org/W2473418344","https://openalex.org/W2744999500","https://openalex.org/W2942091739","https://openalex.org/W2971641579","https://openalex.org/W3103891289","https://openalex.org/W3175663678","https://openalex.org/W3193254256","https://openalex.org/W4312533978","https://openalex.org/W4317796249","https://openalex.org/W4375929024","https://openalex.org/W4389370843","https://openalex.org/W4390604022","https://openalex.org/W4392931300","https://openalex.org/W4401687264"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4401407399"],"abstract_inverted_index":{"Federated":[0],"learning":[1,9,49,149],"is":[2],"a":[3,38,52],"promising":[4],"approach":[5],"for":[6,44,66,142],"training":[7],"machine":[8],"models":[10,132],"while":[11],"preserving":[12],"data":[13],"privacy.":[14],"However,":[15],"its":[16],"distributed":[17],"nature":[18],"makes":[19],"it":[20],"vulnerable":[21,64],"to":[22,86],"backdoor":[23,40,67],"attacks,":[24],"particularly":[25],"in":[26,47,117,130,146],"NLP":[27,45],"tasks,":[28],"where":[29],"related":[30],"research":[31],"remains":[32],"limited.":[33],"This":[34],"paper":[35],"introduces":[36],"SDBA,":[37,92],"novel":[39],"attack":[41],"mechanism":[42],"designed":[43],"tasks":[46,110],"federated":[48,148],"environments.":[50],"Through":[51],"systematic":[53],"analysis":[54],"across":[55],"LSTM":[56],"and":[57,69,73,81,107,121],"GPT-2":[58],"models,":[59],"we":[60,93],"identify":[61],"the":[62,88,98,139],"most":[63],"layers":[65],"injection":[68],"achieve":[70],"both":[71],"stealth":[72],"long-lasting":[74],"durability":[75,120],"by":[76],"applying":[77],"layer-wise":[78],"gradient":[79,83],"masking":[80],"top-k%":[82],"masking.":[84],"Also,":[85],"evaluate":[87],"task":[89],"generalizability":[90],"of":[91,119],"additionally":[94],"conduct":[95],"experiments":[96],"on":[97,102],"T5":[99],"model.":[100],"Experiments":[101],"next-token":[103],"prediction,":[104],"sentiment":[105],"analysis,":[106],"question":[108],"answering":[109],"show":[111],"that":[112],"SDBA":[113],"outperforms":[114],"existing":[115],"backdoors":[116],"terms":[118],"effectively":[122],"bypasses":[123],"representative":[124],"defense":[125,144],"mechanisms,":[126],"demonstrating":[127],"notable":[128],"performance":[129],"transformer-based":[131],"such":[133],"as":[134],"GPT-2.":[135],"These":[136],"results":[137],"highlight":[138],"urgent":[140],"need":[141],"robust":[143],"strategies":[145],"NLP-based":[147],"systems.":[150]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-21T08:13:44.787528","created_date":"2025-10-10T00:00:00"}
