{"id":"https://openalex.org/W4417469942","doi":"https://doi.org/10.1109/tnse.2025.3645850","title":"DPCTS: Dual-Perspective Cross-Client Trust Scoring for Robust Backdoor Defense of Federated Learning Over 6G Networks","display_name":"DPCTS: Dual-Perspective Cross-Client Trust Scoring for Robust Backdoor Defense of Federated Learning Over 6G Networks","publication_year":2025,"publication_date":"2025-12-18","ids":{"openalex":"https://openalex.org/W4417469942","doi":"https://doi.org/10.1109/tnse.2025.3645850"},"language":null,"primary_location":{"id":"doi:10.1109/tnse.2025.3645850","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3645850","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100668480","display_name":"Yaohua Luo","orcid":"https://orcid.org/0000-0002-6192-363X"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]},{"id":"https://openalex.org/I31595395","display_name":"Chengdu University of Technology","ror":"https://ror.org/05pejbw21","country_code":"CN","type":"education","lineage":["https://openalex.org/I31595395"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaohua Luo","raw_affiliation_strings":["School of Computer and Cybersecurity, Chengdu University of Technology, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Cybersecurity, Chengdu University of Technology, Chengdu, China","institution_ids":["https://openalex.org/I31595395","https://openalex.org/I24201400","https://openalex.org/I4210125143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100390943","display_name":"Lei Yuan","orcid":"https://orcid.org/0009-0002-7040-1160"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]},{"id":"https://openalex.org/I31595395","display_name":"Chengdu University of Technology","ror":"https://ror.org/05pejbw21","country_code":"CN","type":"education","lineage":["https://openalex.org/I31595395"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Yuan","raw_affiliation_strings":["School of Computer and Cybersecurity, Chengdu University of Technology, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Cybersecurity, Chengdu University of Technology, Chengdu, China","institution_ids":["https://openalex.org/I31595395","https://openalex.org/I24201400","https://openalex.org/I4210125143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068912643","display_name":"Jianchao Zheng","orcid":"https://orcid.org/0000-0001-6959-0406"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jianchao Zheng","raw_affiliation_strings":["Academy of Military Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Academy of Military Sciences, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100712049","display_name":"Wang Ye","orcid":"https://orcid.org/0000-0002-7636-0227"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Wang","raw_affiliation_strings":["Pengcheng laboratory, Shengzhen, China"],"affiliations":[{"raw_affiliation_string":"Pengcheng laboratory, Shengzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076934078","display_name":"Yuan Gao","orcid":"https://orcid.org/0000-0001-8567-4888"},"institutions":[{"id":"https://openalex.org/I4210141966","display_name":"China Academy of Railway Sciences","ror":"https://ror.org/051wv2j09","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210141966"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Gao","raw_affiliation_strings":["China Academy of Railway Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Academy of Railway Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210141966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073181706","display_name":"Dajiang Chen","orcid":"https://orcid.org/0000-0003-0745-5836"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dajiang Chen","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100668480"],"corresponding_institution_ids":["https://openalex.org/I24201400","https://openalex.org/I31595395","https://openalex.org/I4210125143"],"apc_list":null,"apc_paid":null,"fwci":2.4849,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.92475963,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"13","issue":null,"first_page":"5262","last_page":"5280"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.46140000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.46140000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.31290000677108765,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.016699999570846558,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.7925999760627747},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.5485000014305115},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5266000032424927},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5023000240325928},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4577000141143799},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.42170000076293945},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.41600000858306885},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.3984000086784363},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.39410001039505005}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.7925999760627747},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7634000182151794},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.5485000014305115},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5266000032424927},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5023000240325928},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4577000141143799},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.42170000076293945},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.41600000858306885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4088999927043915},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.3984000086784363},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39469999074935913},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.39410001039505005},{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.38420000672340393},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.38179999589920044},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.3587999939918518},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.32409998774528503},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.296999990940094},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.2867000102996826},{"id":"https://openalex.org/C13662910","wikidata":"https://www.wikidata.org/wiki/Q193139","display_name":"Trajectory","level":2,"score":0.2800000011920929},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27559998631477356},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.271699994802475},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.26330000162124634},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.26330000162124634},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2628999948501587},{"id":"https://openalex.org/C22607594","wikidata":"https://www.wikidata.org/wiki/Q5375150","display_name":"Enabling","level":2,"score":0.2615000009536743},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.260699987411499},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.25690001249313354},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25270000100135803}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2025.3645850","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3645850","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":61,"referenced_works":["https://openalex.org/W2953030092","https://openalex.org/W3033403733","https://openalex.org/W3043758338","https://openalex.org/W3080934299","https://openalex.org/W3082110198","https://openalex.org/W3119680904","https://openalex.org/W3138153888","https://openalex.org/W3138597937","https://openalex.org/W3175919946","https://openalex.org/W3180608480","https://openalex.org/W3206807859","https://openalex.org/W4213446860","https://openalex.org/W4221129260","https://openalex.org/W4224995019","https://openalex.org/W4280598104","https://openalex.org/W4287739163","https://openalex.org/W4290948380","https://openalex.org/W4292230986","https://openalex.org/W4294170691","https://openalex.org/W4294811297","https://openalex.org/W4300806676","https://openalex.org/W4313451624","https://openalex.org/W4315777552","https://openalex.org/W4316661314","https://openalex.org/W4382051836","https://openalex.org/W4386453702","https://openalex.org/W4388145809","https://openalex.org/W4390660449","https://openalex.org/W4390871494","https://openalex.org/W4391620743","https://openalex.org/W4391724779","https://openalex.org/W4391827207","https://openalex.org/W4392251605","https://openalex.org/W4393035330","https://openalex.org/W4393156872","https://openalex.org/W4393864804","https://openalex.org/W4393973474","https://openalex.org/W4398788557","https://openalex.org/W4399680845","https://openalex.org/W4399727824","https://openalex.org/W4400112623","https://openalex.org/W4400226877","https://openalex.org/W4403977001","https://openalex.org/W4404056978","https://openalex.org/W4404520562","https://openalex.org/W4404601267","https://openalex.org/W4404688262","https://openalex.org/W4404914697","https://openalex.org/W4405598864","https://openalex.org/W4407080703","https://openalex.org/W4407448835","https://openalex.org/W4407449117","https://openalex.org/W4407826124","https://openalex.org/W4408222626","https://openalex.org/W4408443241","https://openalex.org/W4410226695","https://openalex.org/W4410359295","https://openalex.org/W4410808519","https://openalex.org/W4412404024","https://openalex.org/W4413318932","https://openalex.org/W4415795262"],"related_works":[],"abstract_inverted_index":{"Federated":[0],"learning":[1],"(FL)":[2],"has":[3],"emerged":[4],"as":[5],"a":[6,69,84,102,152,183,203],"natural":[7],"enabler":[8],"for":[9,19],"distributed":[10],"intelligence":[11],"in":[12],"next-generation":[13],"wireless":[14],"networks":[15],"(e.g.,":[16],"6G),":[17],"particularly":[18],"realizing":[20],"intelligent":[21],"radio":[22],"access":[23],"and":[24,132,187,194,199,210],"autonomous":[25],"spectrum":[26],"management.":[27],"However,":[28],"the":[29,45,128,136,149,177,189,216],"integration":[30],"of":[31,151],"FL":[32,72],"introduces":[33],"critical":[34],"security":[35],"challenges,":[36],"most":[37],"no":[38],"tably":[39],"backdoor":[40,231],"attacks,":[41],"where":[42],"adversaries":[43],"compromise":[44],"global":[46,97,130,138],"model":[47,239],"by":[48],"injecting":[49],"malicious":[50],"updates":[51],"while":[52,168,236],"maintaining":[53,237],"benign":[54,193],"performance.":[55],"In":[56],"this":[57],"paper,":[58],"we":[59],"propose":[60],"DPCTS":[61,100],"(Decentralized":[62],"Trust":[63,67],"Propagation":[64],"with":[65,79,135],"Cross-Client":[66],"Synthesis),":[68],"novel":[70],"anti-backdoor":[71],"framework":[73],"that":[74,93,176,188],"integrates":[75],"multi-dimensional":[76],"trust":[77,81,105,142,163,178,190,212],"evaluation":[78],"graph-based":[80],"propagation":[82,179],"via":[83],"dy":[85],"namically":[86],"weighted":[87],"restart":[88],"mechanism.":[89],"Unlike":[90],"existing":[91],"methods":[92],"depend":[94],"on":[95,96,222],"anomaly":[98],"detection,":[99],"employs":[101],"fully":[103],"decentralized":[104],"modeling":[106],"paradigm.":[107],"specifically,":[108],"each":[109,158],"client's":[110],"trustworthiness":[111],"is":[112],"dynamically":[113],"assessed":[114],"through":[115],"three":[116],"complementary":[117],"dimensions:":[118],"behavioral":[119],"consistency":[120],"across":[121,148],"local":[122],"training":[123],"iterations,":[124],"trajectory":[125],"divergence":[126],"from":[127,165],"aggregated":[129],"model,":[131],"statistical":[133],"alignment":[134],"evolving":[137],"data":[139],"distribution.":[140],"Crucially,":[141],"scores":[143],"are":[144],"propagated":[145],"itera":[146],"tively":[147],"edges":[150],"constructed":[153],"client":[154],"interaction":[155],"graph,":[156],"enabling":[157],"participant":[159],"to":[160,182,230],"accumulate":[161],"indirect":[162],"evidence":[164],"multi-hop":[166],"neighbors":[167],"mitigating":[169],"localized":[170],"biases.":[171],"The":[172],"theoretical":[173],"analysis":[174],"proves":[175],"process":[180],"converges":[181],"unique":[184],"fixed":[185],"point":[186],"gap":[191],"between":[192],"adversarial":[195],"clients":[196],"monotonically":[197],"increases":[198],"sta":[200],"bilizes":[201],"at":[202],"positive":[204],"margin,":[205],"ensuring":[206],"both":[207],"algorithmic":[208],"stability":[209],"effective":[211],"separation.":[213],"We":[214],"evaluate":[215],"proposed":[217],"method":[218],"against":[219],"state-of-the-art":[220],"defenses":[221],"multiple":[223],"benchmark":[224],"datasets,":[225],"demonstrating":[226],"its":[227],"superior":[228],"resistance":[229],"attacks":[232],"under":[233],"extreme":[234],"conditions":[235],"comparable":[238],"utility.":[240]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-18T00:00:00"}
