{"id":"https://openalex.org/W3011711630","doi":"https://doi.org/10.1145/3374664.3379534","title":"Poisoning Attacks in Federated Learning","display_name":"Poisoning Attacks in Federated Learning","publication_year":2020,"publication_date":"2020-03-13","ids":{"openalex":"https://openalex.org/W3011711630","doi":"https://doi.org/10.1145/3374664.3379534","mag":"3011711630"},"language":"en","primary_location":{"id":"doi:10.1145/3374664.3379534","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3379534","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050723302","display_name":"Florian Nuding","orcid":null},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Florian Nuding","raw_affiliation_strings":["Vienna University of Technology, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Vienna University of Technology, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054726748","display_name":"Rudolf Mayer","orcid":"https://orcid.org/0000-0003-0424-5999"},"institutions":[{"id":"https://openalex.org/I4210167190","display_name":"SBA Research","ror":"https://ror.org/05nny6x17","country_code":"AT","type":"facility","lineage":["https://openalex.org/I4210167190"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Rudolf Mayer","raw_affiliation_strings":["SBA Research gGmbH, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"SBA Research gGmbH, Vienna, Austria","institution_ids":["https://openalex.org/I4210167190"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5050723302"],"corresponding_institution_ids":["https://openalex.org/I145847075"],"apc_list":null,"apc_paid":null,"fwci":1.8558,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.88213342,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"168","last_page":"170"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9699000120162964,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9452869296073914},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8366044759750366},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6658526659011841},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6632581949234009},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5500596165657043},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5103930830955505},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4654484689235687},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.43055206537246704},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4295158386230469},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36775439977645874}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9452869296073914},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8366044759750366},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6658526659011841},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6632581949234009},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5500596165657043},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5103930830955505},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4654484689235687},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.43055206537246704},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4295158386230469},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36775439977645874},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3374664.3379534","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3379534","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2275354088","display_name":null,"funder_award_id":"826078","funder_id":"https://openalex.org/F4320335254","funder_display_name":"Horizon 2020"}],"funders":[{"id":"https://openalex.org/F4320335254","display_name":"Horizon 2020","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2748789698","https://openalex.org/W2773446523","https://openalex.org/W2810065831","https://openalex.org/W2903456157","https://openalex.org/W2912023992","https://openalex.org/W2912213068","https://openalex.org/W2913668833","https://openalex.org/W2963359529","https://openalex.org/W2963422767","https://openalex.org/W4301880089"],"related_works":["https://openalex.org/W3127875616","https://openalex.org/W4225324593","https://openalex.org/W3046843850","https://openalex.org/W4386716251","https://openalex.org/W2391167130","https://openalex.org/W2092071486","https://openalex.org/W4283067488","https://openalex.org/W4385573125","https://openalex.org/W2990595670","https://openalex.org/W2460246254"],"abstract_inverted_index":{"Federated":[0,117],"Learning":[1,75],"has":[2,110],"recently":[3],"gained":[4],"attraction":[5],"as":[6],"a":[7,99,145,151,175,179],"means":[8],"to":[9,14,94,143,170],"analyze":[10],"data":[11,20],"without":[12],"having":[13],"centralize":[15],"it":[16],"from":[17,56],"initially":[18],"distributed":[19,58,120],"sources.":[21],"Generally,":[22],"this":[23,131,137],"is":[24],"achieved":[25],"by":[26,63,101],"only":[27],"exchanging":[28],"and":[29,68,85,173],"aggregating":[30],"the":[31,34,57,61,82,96,103,114,119,140,148,163],"parameters":[32],"of":[33,42,46,60,98,116,139,150,165,181],"locally":[35],"learned":[36],"models.":[37],"This":[38],"enables":[39],"better":[40],"handling":[41],"sensitive":[43],"data,":[44],"e.g.":[45],"individuals,":[47],"or":[48],"business":[49],"related":[50],"content.":[51],"Applications":[52],"can":[53],"further":[54],"benefit":[55],"nature":[59],"learning":[62,83],"using":[64],"multiple":[65],"computer":[66],"resources,":[67],"eliminating":[69],"network":[70],"communication":[71],"overhead.":[72],"Adversarial":[73],"Machine":[74],"in":[76,168],"general":[77],"deals":[78],"with":[79],"attacks":[80,87],"on":[81,105,147,178],"process,":[84],"backdoor":[86,146],"are":[88],"one":[89],"specific":[90],"attack":[91,126],"that":[92,112],"tries":[93],"break":[95],"integrity":[97],"model":[100],"manipulating":[102],"behavior":[104],"certain":[106],"inputs.":[107],"Recent":[108],"work":[109],"shown":[111],"despite":[113],"benefits":[115],"Learning,":[118],"setting":[121,164],"also":[122],"opens":[123],"up":[124],"new":[125],"vectors":[127],"for":[128,153],"adversaries.":[129],"In":[130],"paper,":[132],"we":[133,160],"thus":[134],"specifically":[135,161],"study":[136],"manipulation":[138],"training":[141],"process":[142],"embed":[144],"example":[149],"dataset":[152],"traffic":[154],"sign":[155],"classification.":[156],"Extending":[157],"earlier":[158],"work,":[159],"include":[162],"sequential":[166],"learning,":[167],"additional":[169],"parallel":[171],"averaging,":[172],"perform":[174],"broad":[176],"analysis":[177],"number":[180],"different":[182],"settings.":[183]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
