{"id":"https://openalex.org/W4412939403","doi":"https://doi.org/10.1109/tdsc.2025.3594175","title":"AMA: Adaptive Model Poisoning Attacks Towards Federated Learning","display_name":"AMA: Adaptive Model Poisoning Attacks Towards Federated Learning","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4412939403","doi":"https://doi.org/10.1109/tdsc.2025.3594175"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3594175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3594175","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100602148","display_name":"Di Wu","orcid":"https://orcid.org/0000-0001-6979-3537"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Di Wu","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong Univiersity, Xi&#x2019;an, China","School of Computer Science and Technology, Xi&#x0027;an Jiaotong Univiersity, China"],"raw_orcid":"https://orcid.org/0000-0001-6979-3537","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong Univiersity, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x0027;an Jiaotong Univiersity, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qi Guo","orcid":"https://orcid.org/0000-0001-5507-3424"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Guo","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong Univiersity, Xi&#x2019;an, China","School of Computer Science and Technology, Xi&#x0027;an Jiaotong Univiersity, China"],"raw_orcid":"https://orcid.org/0000-0001-5507-3424","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong Univiersity, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x0027;an Jiaotong Univiersity, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052373347","display_name":"Yong Qi","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Qi","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong Univiersity, Xi&#x2019;an, China","School of Computer Science and Technology, Xi&#x0027;an Jiaotong Univiersity, China"],"raw_orcid":"https://orcid.org/0000-0002-7682-5653","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong Univiersity, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x0027;an Jiaotong Univiersity, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021497508","display_name":"Saiyu Qi","orcid":"https://orcid.org/0000-0002-0394-4432"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Saiyu Qi","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong Univiersity, Xi&#x2019;an, China","School of Computer Science and Technology, Xi&#x0027;an Jiaotong Univiersity, China"],"raw_orcid":"https://orcid.org/0000-0002-0394-4432","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong Univiersity, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x0027;an Jiaotong Univiersity, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073922452","display_name":"Qian Li","orcid":"https://orcid.org/0000-0002-0110-451X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Li","raw_affiliation_strings":["Ministry of Education Key Laboratory for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","School of Computer Science and Technology, Xi&#x0027;an Jiaotong Univiersity, China"],"raw_orcid":"https://orcid.org/0000-0002-0110-451X","affiliations":[{"raw_affiliation_string":"Ministry of Education Key Laboratory for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x0027;an Jiaotong Univiersity, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100602148"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":2.1733,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.89726933,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"22","issue":"6","first_page":"7125","last_page":"7138"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9047999978065491,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7841203808784485},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6047033071517944},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4177652597427368}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7841203808784485},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6047033071517944},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4177652597427368}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3594175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3594175","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2194775991","https://openalex.org/W2535690855","https://openalex.org/W2767079719","https://openalex.org/W2798720628","https://openalex.org/W2962763344","https://openalex.org/W2963318081","https://openalex.org/W2963857521","https://openalex.org/W2964082701","https://openalex.org/W2984242138","https://openalex.org/W3127520698","https://openalex.org/W3138153888","https://openalex.org/W3138597937","https://openalex.org/W3198262235","https://openalex.org/W4206320562","https://openalex.org/W4213446860","https://openalex.org/W4226047321","https://openalex.org/W4229455429","https://openalex.org/W4288057793","https://openalex.org/W4296831829","https://openalex.org/W4408750083"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"is":[3],"vulnerable":[4],"to":[5,35,49,66,105,136,159],"model":[6,70,92,102,116,130,180],"poisoning":[7,71,117,181],"attacks,":[8],"where":[9],"malicious":[10,37,134,157,163],"updates":[11,28,42,135,145,198],"(e.g.,":[12],"gradients)":[13],"can":[14],"adversely":[15],"interfere":[16],"with":[17],"the":[18,27,40,75,85,97,100,128,133,138,143,152,156,162,167,170,174,177,199],"global":[19,139],"model.":[20,140],"Existing":[21],"attacks":[22,56],"typically":[23],"rely":[24],"heavily":[25],"on":[26,74,204],"of":[29,87,99,142,155,173,179,201],"benign":[30,41,144],"clients":[31],"and":[32,43,58,103,146,176,197,210],"aggregation":[33,44,147],"algorithms":[34,45],"craft":[36,161],"updates.":[38,164],"However,":[39],"are":[46],"usually":[47],"hard":[48],"access":[50],"for":[51],"attackers,":[52],"which":[53,126],"makes":[54],"their":[55],"weak":[57],"volatile.":[59],"Therefore,":[60],"in":[61],"this":[62],"work,":[63],"we":[64,79,111,149],"aim":[65],"design":[67],"an":[68],"adaptive":[69,115],"attack":[72,118,137,195,202],"based":[73],"agnostic":[76],"adversary.":[77],"Specifically,":[78],"propose":[80],"a":[81,113],"new":[82],"concept":[83],"from":[84],"perspective":[86],"adversarial":[88,91,129],"learning,":[89],"called":[90],"perturbation.":[93],"This":[94],"perturbation":[95,131],"targets":[96],"parameters":[98],"local":[101],"aims":[104],"maximally":[106],"mislead":[107],"its":[108],"predictions.":[109],"Then,":[110],"develop":[112],"novel":[114],"named":[119],"<italic":[120],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[121],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Adversarial":[122],"Model":[123],"Attack":[124],"(AMA)</i>,":[125],"utilizes":[127],"as":[132],"Instead":[141],"algorithms,":[148],"only":[150],"leverage":[151],"original":[153],"data":[154],"client":[158],"adaptively":[160],"AMA":[165,192],"resolves":[166],"conflict":[168],"between":[169],"knowledge":[171],"requirement":[172],"adversary":[175],"impact":[178,203],"attacks.":[182],"Empirical":[183],"results":[184],"against":[185],"multiple":[186],"robust":[187],"FL":[188],"methods":[189,196],"show":[190],"that":[191],"surpasses":[193],"state-of-the-art":[194],"benchmark":[200],"Fedavg,":[205],"Trimean,":[206],"Multi-Krum,":[207],"FoundationFL,":[208],"RFA,":[209],"Median.":[211]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
