{"id":"https://openalex.org/W4406047340","doi":"https://doi.org/10.1109/tnsm.2025.3525554","title":"Federated Learning Under Attack: Exposing Vulnerabilities Through Data Poisoning Attacks in Computer Networks","display_name":"Federated Learning Under Attack: Exposing Vulnerabilities Through Data Poisoning Attacks in Computer Networks","publication_year":2025,"publication_date":"2025-01-03","ids":{"openalex":"https://openalex.org/W4406047340","doi":"https://doi.org/10.1109/tnsm.2025.3525554"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2025.3525554","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3525554","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://gala.gre.ac.uk/id/eprint/49321/7/49321%20NOWROOZI_Federated_Learning_Under_Attack_Exposing_Vulnerabilities_Through_Data_Poisoning_Attacks_in_Computer_Networks_%28AAM%29_2025.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014302355","display_name":"Ehsan Nowroozi","orcid":"https://orcid.org/0000-0002-5714-8378"},"institutions":[{"id":"https://openalex.org/I128277893","display_name":"Bah\u00e7e\u015fehir University","ror":"https://ror.org/00yze4d93","country_code":"TR","type":"education","lineage":["https://openalex.org/I128277893"]},{"id":"https://openalex.org/I55060895","display_name":"University of Greenwich","ror":"https://ror.org/00bmj0a71","country_code":"GB","type":"education","lineage":["https://openalex.org/I55060895"]}],"countries":["GB","TR"],"is_corresponding":true,"raw_author_name":"Ehsan Nowroozi","raw_affiliation_strings":["Centre for Sustainable Cyber Security (CS2), University of Greenwich, London, U.K","Department of Natural Engineering and Sciences, Bahcesehir University (BAU), Istanbul, Turkey","Centre for Sustainable Cyber Security, University of Greenwich, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Sustainable Cyber Security (CS2), University of Greenwich, London, U.K","institution_ids":["https://openalex.org/I55060895"]},{"raw_affiliation_string":"Department of Natural Engineering and Sciences, Bahcesehir University (BAU), Istanbul, Turkey","institution_ids":["https://openalex.org/I128277893"]},{"raw_affiliation_string":"Centre for Sustainable Cyber Security, University of Greenwich, London, United Kingdom","institution_ids":["https://openalex.org/I55060895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101858023","display_name":"Imran Haider","orcid":"https://orcid.org/0009-0006-4928-0199"},"institutions":[{"id":"https://openalex.org/I128277893","display_name":"Bah\u00e7e\u015fehir University","ror":"https://ror.org/00yze4d93","country_code":"TR","type":"education","lineage":["https://openalex.org/I128277893"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Imran Haider","raw_affiliation_strings":["Department of Natural Engineering and Sciences, Bahcesehir University, Istanbul, T&#x00FC;rkiye","Department of Natural Engineering and Sciences, Bahcesehir University (BAU), Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Natural Engineering and Sciences, Bahcesehir University, Istanbul, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I128277893"]},{"raw_affiliation_string":"Department of Natural Engineering and Sciences, Bahcesehir University (BAU), Istanbul, Turkey","institution_ids":["https://openalex.org/I128277893"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027232901","display_name":"Rahim Taheri","orcid":"https://orcid.org/0000-0002-4078-3105"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rahim Taheri","raw_affiliation_strings":["School of Computing, Faculty of Technology, University of Portsmouth, Portsmouth, U.K","Faculty of Technology, School of Computing, University of Portsmouth, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, Faculty of Technology, University of Portsmouth, Portsmouth, U.K","institution_ids":["https://openalex.org/I63072094"]},{"raw_affiliation_string":"Faculty of Technology, School of Computing, University of Portsmouth, United Kingdom","institution_ids":["https://openalex.org/I63072094"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063847107","display_name":"Mauro Conti","orcid":"https://orcid.org/0000-0002-3612-1934"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]},{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["IT","NL"],"is_corresponding":false,"raw_author_name":"Mauro Conti","raw_affiliation_strings":["Department of Mathematics, Security and Privacy Research Group, University of Padua, Padua, Italy","Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Security and Privacy Research Group, University of Padua, Padua, Italy","institution_ids":["https://openalex.org/I138689650"]},{"raw_affiliation_string":"Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014302355"],"corresponding_institution_ids":["https://openalex.org/I128277893","https://openalex.org/I55060895"],"apc_list":null,"apc_paid":null,"fwci":67.0917,"has_fulltext":true,"cited_by_count":27,"citation_normalized_percentile":{"value":0.99889393,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"22","issue":"1","first_page":"822","last_page":"831"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8735817670822144},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7183129191398621},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6781319379806519},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6092826128005981},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5295069217681885},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5183814167976379},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5104597806930542},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.49847865104675293},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.47892698645591736},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.46970030665397644},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.45339325070381165},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.42099612951278687},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.41789957880973816},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4161328673362732},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3265446424484253},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22144490480422974}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8735817670822144},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7183129191398621},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6781319379806519},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6092826128005981},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5295069217681885},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5183814167976379},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5104597806930542},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.49847865104675293},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.47892698645591736},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.46970030665397644},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.45339325070381165},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.42099612951278687},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.41789957880973816},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4161328673362732},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3265446424484253},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22144490480422974},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tnsm.2025.3525554","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3525554","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},{"id":"pmh:oai:gala.gre.ac.uk:49321","is_oa":true,"landing_page_url":"https://orcid.org/0000-0002-5714-8378","pdf_url":"https://gala.gre.ac.uk/id/eprint/49321/7/49321%20NOWROOZI_Federated_Learning_Under_Attack_Exposing_Vulnerabilities_Through_Data_Poisoning_Attacks_in_Computer_Networks_%28AAM%29_2025.pdf","source":{"id":"https://openalex.org/S4306401244","display_name":"Greenwich Academic Literature Archive (University of Greenwich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I55060895","host_organization_name":"University of Greenwich","host_organization_lineage":["https://openalex.org/I55060895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:www.research.unipd.it:11577/3545939","is_oa":false,"landing_page_url":"https://hdl.handle.net/11577/3545939","pdf_url":null,"source":{"id":"https://openalex.org/S4377196283","display_name":"Research Padua  Archive (University of Padua)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138689650","host_organization_name":"University of Padua","host_organization_lineage":["https://openalex.org/I138689650"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:gala.gre.ac.uk:49321","is_oa":true,"landing_page_url":"https://orcid.org/0000-0002-5714-8378","pdf_url":"https://gala.gre.ac.uk/id/eprint/49321/7/49321%20NOWROOZI_Federated_Learning_Under_Attack_Exposing_Vulnerabilities_Through_Data_Poisoning_Attacks_in_Computer_Networks_%28AAM%29_2025.pdf","source":{"id":"https://openalex.org/S4306401244","display_name":"Greenwich Academic Literature Archive (University of Greenwich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I55060895","host_organization_name":"University of Greenwich","host_organization_lineage":["https://openalex.org/I55060895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4406047340.pdf","grobid_xml":"https://content.openalex.org/works/W4406047340.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W1999427165","https://openalex.org/W2099940443","https://openalex.org/W2296509296","https://openalex.org/W2591882872","https://openalex.org/W2924689635","https://openalex.org/W3016191659","https://openalex.org/W3084847664","https://openalex.org/W3108630703","https://openalex.org/W3171802458","https://openalex.org/W4205488455","https://openalex.org/W4220721049","https://openalex.org/W4312403682","https://openalex.org/W4315642187","https://openalex.org/W4320717670","https://openalex.org/W4322576473","https://openalex.org/W4360841610","https://openalex.org/W4381886281","https://openalex.org/W4385210255","https://openalex.org/W4386840513","https://openalex.org/W4387460392","https://openalex.org/W4388162437","https://openalex.org/W4388591491","https://openalex.org/W4388624485","https://openalex.org/W4392602851","https://openalex.org/W4396768380","https://openalex.org/W4396982182","https://openalex.org/W4400316269","https://openalex.org/W4401879412","https://openalex.org/W6734354522","https://openalex.org/W6763029429","https://openalex.org/W6778519234","https://openalex.org/W6839421850","https://openalex.org/W6849894166","https://openalex.org/W6867924515"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W4388745254","https://openalex.org/W2980082554","https://openalex.org/W1517228774","https://openalex.org/W2767419625","https://openalex.org/W2389704471"],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"is":[2],"an":[3],"approach":[4,209],"that":[5,132],"enables":[6],"multiple":[7],"devices":[8],"to":[9,29,119,196],"collectively":[10],"train":[11],"a":[12,100,183,206],"shared":[13],"model":[14,159,187],"without":[15,181],"sharing":[16],"raw":[17],"data,":[18],"thereby":[19],"preserving":[20],"data":[21],"privacy.":[22],"However,":[23],"federated":[24,193],"learning":[25,194],"systems":[26,195],"are":[27,146],"vulnerable":[28],"data-poisoning":[30,39],"attacks":[31,137,156,177],"during":[32,227],"the":[33,57,82,111,124,150,179,190,237],"training":[34],"and":[35,44,59,86,126,135,165,172,225],"updating":[36],"stages.":[37],"Three":[38],"attacks\u2013label":[40],"flipping,":[41,64],"feature":[42,73,154,175,244],"poisoning,":[43,74],"VagueGAN\u2013are":[45],"tested":[46],"on":[47,123,243],"FL":[48],"models":[49],"across":[50],"one":[51],"out":[52],"of":[53,69,103,192,239],"ten":[54],"clients":[55],"using":[56,93],"CIC":[58],"UNSW":[60],"datasets.":[61],"For":[62],"label":[63,133],"we":[65,75,89,109,204],"randomly":[66],"modify":[67,117],"labels":[68],"benign":[70],"data;":[71],"for":[72,87],"alter":[76],"highly":[77,233],"influential":[78],"features":[79,219],"identified":[80],"by":[81,113,149],"Random":[83,212],"Forest":[84],"technique;":[85],"VagueGAN,":[88],"generate":[90],"adversarial":[91],"examples":[92],"Generative":[94],"Adversarial":[95,97],"Networks.":[96],"samples":[98],"constitute":[99],"small":[101],"portion":[102],"each":[104],"dataset.":[105],"In":[106,152],"this":[107],"study,":[108],"vary":[110],"percentages":[112],"which":[114,216],"adversaries":[115],"can":[116],"datasets":[118],"observe":[120],"their":[121,170],"impact":[122,238],"Client":[125],"Server":[127],"sides.":[128],"Experimental":[129],"findings":[130],"indicate":[131],"flipping":[134],"VagueGAN":[136],"do":[138],"not":[139],"significantly":[140],"affect":[141],"server":[142,180,218],"accuracy,":[143,188],"as":[144,211],"they":[145],"easily":[147],"detectable":[148],"Server.":[151],"contrast,":[153],"poisoning":[155,176],"subtly":[157],"undermine":[158],"performance":[160],"while":[161],"maintaining":[162],"high":[163],"accuracy":[164],"attack":[166],"success":[167],"rates,":[168],"highlighting":[169],"subtlety":[171],"effectiveness.":[173],"Therefore,":[174],"manipulate":[178],"causing":[182],"significant":[184],"decrease":[185],"in":[186,235],"underscoring":[189],"vulnerability":[191],"such":[197,240],"sophisticated":[198],"attacks.":[199],"To":[200],"mitigate":[201],"these":[202],"vulnerabilities,":[203],"explore":[205],"recent":[207],"defensive":[208],"known":[210],"Deep":[213],"Feature":[214],"Selection,":[215],"randomizes":[217],"with":[220],"varying":[221],"sizes":[222],"(e.g.,":[223],"50":[224],"400)":[226],"training.":[228],"This":[229],"strategy":[230],"has":[231],"proven":[232],"effective":[234],"minimizing":[236],"attacks,":[241],"particularly":[242],"poisoning.":[245]},"counts_by_year":[{"year":2026,"cited_by_count":9},{"year":2025,"cited_by_count":18}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
