{"id":"https://openalex.org/W4383221569","doi":"https://doi.org/10.1145/3579856.3590328","title":"SoK: Systematizing Attack Studies in Federated Learning \u2013 From Sparseness to Completeness","display_name":"SoK: Systematizing Attack Studies in Federated Learning \u2013 From Sparseness to Completeness","publication_year":2023,"publication_date":"2023-07-05","ids":{"openalex":"https://openalex.org/W4383221569","doi":"https://doi.org/10.1145/3579856.3590328"},"language":"en","primary_location":{"id":"doi:10.1145/3579856.3590328","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3590328","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055776740","display_name":"Garv Sharma","orcid":"https://orcid.org/0009-0005-7333-8752"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Geetanjli Sharma","raw_affiliation_strings":["La Trobe University, Australia and CSIRO's Data61, Australia"],"raw_orcid":"https://orcid.org/0009-0005-7333-8752","affiliations":[{"raw_affiliation_string":"La Trobe University, Australia and CSIRO's Data61, Australia","institution_ids":["https://openalex.org/I196829312","https://openalex.org/I1292875679","https://openalex.org/I42894916"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063839073","display_name":"M.A.P. Chamikara","orcid":"https://orcid.org/0000-0002-4286-3774"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"M.A.P. Chamikara","raw_affiliation_strings":["CSIRO's Data61, Australia"],"raw_orcid":"https://orcid.org/0000-0002-4286-3774","affiliations":[{"raw_affiliation_string":"CSIRO's Data61, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000678710","display_name":"Mohan Baruwal Chhetri","orcid":"https://orcid.org/0000-0002-6138-7742"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mohan Baruwal Chhetri","raw_affiliation_strings":["CSIRO's Data61, Australia"],"raw_orcid":"https://orcid.org/0000-0002-6138-7742","affiliations":[{"raw_affiliation_string":"CSIRO's Data61, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100728316","display_name":"Yi\u2010Ping Phoebe Chen","orcid":"https://orcid.org/0000-0002-4122-3767"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi-Ping Phoebe Chen","raw_affiliation_strings":["La Trobe University, Australia"],"raw_orcid":"https://orcid.org/0000-0002-4122-3767","affiliations":[{"raw_affiliation_string":"La Trobe University, Australia","institution_ids":["https://openalex.org/I196829312"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5055776740"],"corresponding_institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I196829312","https://openalex.org/I42894916"],"apc_list":null,"apc_paid":null,"fwci":0.3408,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64425717,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"579","last_page":"592"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9157000184059143,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7837278842926025},{"id":"https://openalex.org/keywords/completeness","display_name":"Completeness (order theory)","score":0.7641050219535828},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7092872262001038},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7006910443305969},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.48889556527137756},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.4624815881252289},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4383341073989868},{"id":"https://openalex.org/keywords/latent-variable","display_name":"Latent variable","score":0.4186874032020569},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4156913161277771},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39801472425460815},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07494351267814636}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7837278842926025},{"id":"https://openalex.org/C17231256","wikidata":"https://www.wikidata.org/wiki/Q5156540","display_name":"Completeness (order theory)","level":2,"score":0.7641050219535828},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7092872262001038},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7006910443305969},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.48889556527137756},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.4624815881252289},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4383341073989868},{"id":"https://openalex.org/C51167844","wikidata":"https://www.wikidata.org/wiki/Q4422623","display_name":"Latent variable","level":2,"score":0.4186874032020569},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4156913161277771},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39801472425460815},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07494351267814636},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3579856.3590328","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3590328","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2930926105","https://openalex.org/W2963456518","https://openalex.org/W2966683668","https://openalex.org/W2995191368","https://openalex.org/W3021654819","https://openalex.org/W3033686777","https://openalex.org/W3041107652","https://openalex.org/W3084847664","https://openalex.org/W3091870957","https://openalex.org/W3097210233","https://openalex.org/W3103245149","https://openalex.org/W3106047871","https://openalex.org/W3136620885","https://openalex.org/W3138153888","https://openalex.org/W3138198612","https://openalex.org/W3157850870","https://openalex.org/W3167500796","https://openalex.org/W3202153100","https://openalex.org/W3203780767","https://openalex.org/W3203932036","https://openalex.org/W3211470872","https://openalex.org/W3213330817","https://openalex.org/W3213758553","https://openalex.org/W4207073300","https://openalex.org/W4210630464","https://openalex.org/W4213110664","https://openalex.org/W4220928404","https://openalex.org/W4224316323","https://openalex.org/W4226493408","https://openalex.org/W4229455429","https://openalex.org/W4249340183","https://openalex.org/W4280575929","https://openalex.org/W4288057793","https://openalex.org/W4298260245","https://openalex.org/W4300991139"],"related_works":["https://openalex.org/W4320018150","https://openalex.org/W2040808657","https://openalex.org/W2918664383","https://openalex.org/W4320855730","https://openalex.org/W106056076","https://openalex.org/W2135200719","https://openalex.org/W4307079546","https://openalex.org/W4283317927","https://openalex.org/W4387796593","https://openalex.org/W2604394466"],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"is":[3,66,173],"a":[4,15,67,103,148],"machine":[5],"learning":[6],"technique":[7],"that":[8,29,106,119],"enables":[9],"multiple":[10],"parties":[11],"to":[12,33,82,150,174],"collaboratively":[13],"train":[14],"model":[16,105,159],"using":[17],"their":[18,95,116,154],"private":[19],"datasets.":[20],"Given":[21],"its":[22,162],"decentralized":[23],"nature,":[24],"FL":[25,42,143,179,191],"has":[26],"inherent":[27],"vulnerabilities":[28],"make":[30],"it":[31],"susceptible":[32],"adversarial":[34],"attacks.":[35],"The":[36,129],"success":[37,123],"of":[38,59,70,88,124,167,190],"an":[39,125],"attack":[40,54,74,126,144,169,184],"on":[41,72,76,127,142],"depends":[43],"upon":[44],"several":[45],"(latent)":[46,113],"factors,":[47,114],"including":[48],"the":[49,52,57,60,86,108,111,122,139,158,178,188],"adversary\u2019s":[50],"strength,":[51],"chosen":[53],"strategy,":[55],"and":[56,84,115,146,152,160,186],"effectiveness":[58],"defense":[61],"measures":[62],"in":[63,177],"place.":[64],"There":[65],"growing":[68],"body":[69],"literature":[71,141],"empirical":[73],"studies":[75,145,185],"FL,":[77],"but":[78],"no":[79],"systematic":[80],"way":[81,149],"compare":[83,151],"evaluate":[85],"completeness":[87],"these":[89],"studies,":[90],"which":[91],"raises":[92],"questions":[93],"about":[94],"validity.":[96],"To":[97],"address":[98],"this":[99],"problem,":[100],"we":[101],"introduce":[102],"causal":[104],"captures":[107],"relationship":[109],"between":[110],"different":[112],"reflexive":[117],"indicators,":[118],"can":[120],"impact":[121],"FL.":[128],"proposed":[130],"model,":[131],"inspired":[132],"by":[133],"structural":[134],"equation":[135],"modeling,":[136],"helps":[137],"systematize":[138],"existing":[140],"provides":[147],"contrast":[153],"completeness.":[155],"We":[156],"validate":[157],"demonstrate":[161],"utility":[163],"through":[164],"experimental":[165],"evaluation":[166],"select":[168],"studies.":[170],"Our":[171],"aim":[172],"help":[175],"researchers":[176],"domain":[180],"design":[181],"more":[182],"complete":[183],"improve":[187],"understanding":[189],"vulnerabilities.":[192]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
