{"id":"https://openalex.org/W4400121396","doi":"https://doi.org/10.1145/3634737.3637682","title":"Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity","display_name":"Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity","publication_year":2024,"publication_date":"2024-06-28","ids":{"openalex":"https://openalex.org/W4400121396","doi":"https://doi.org/10.1145/3634737.3637682"},"language":"en","primary_location":{"id":"doi:10.1145/3634737.3637682","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3634737.3637682","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080243955","display_name":"Kane Walter","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Kane Walter","raw_affiliation_strings":["UNSW, Sydney, Australia"],"raw_orcid":"https://orcid.org/0000-0002-9759-4305","affiliations":[{"raw_affiliation_string":"UNSW, Sydney, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076389456","display_name":"Meisam Mohammady","orcid":null},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Meisam Mohammady","raw_affiliation_strings":["Iowa State University of Science and Technology, Iowa, USA"],"raw_orcid":"https://orcid.org/0000-0002-0619-6361","affiliations":[{"raw_affiliation_string":"Iowa State University of Science and Technology, Iowa, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["Data61, CSIRO, Sydney, Australia"],"raw_orcid":"https://orcid.org/0000-0002-3289-6599","affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059077090","display_name":"Salil S. Kanhere","orcid":"https://orcid.org/0000-0002-1835-3475"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Salil S. Kanhere","raw_affiliation_strings":["UNSW, Sydney, Australia"],"raw_orcid":"https://orcid.org/0000-0002-1835-3475","affiliations":[{"raw_affiliation_string":"UNSW, Sydney, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080243955"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":0.3311,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6324146,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1287","last_page":"1298"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9908738732337952},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7632529139518738},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.5907980799674988},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4149215519428253},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39012885093688965},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3650251030921936},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.1891694962978363}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9908738732337952},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7632529139518738},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.5907980799674988},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4149215519428253},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39012885093688965},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3650251030921936},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.1891694962978363}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3634737.3637682","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3634737.3637682","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1506806321","https://openalex.org/W2559840118","https://openalex.org/W2560674852","https://openalex.org/W2747329762","https://openalex.org/W2783522756","https://openalex.org/W2942091739","https://openalex.org/W2990270730","https://openalex.org/W3100779497","https://openalex.org/W3138597937","https://openalex.org/W3204548896"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4386185023"],"abstract_inverted_index":{"Federated":[0,168,200],"Learning":[1,169],"(FL)":[2],"is":[3,29],"a":[4,14,157],"privacy-preserving,":[5],"collaborative":[6],"machine":[7],"learning":[8],"technique":[9],"where":[10,34],"multiple":[11],"clients":[12],"train":[13],"shared":[15],"model":[16,38,42,93,105,228],"on":[17,60,65,119],"their":[18],"private":[19],"datasets":[20],"without":[21,223],"sharing":[22],"the":[23,41,76,100,103,120,126,141,148,173,221,235],"data.":[24],"While":[25],"offering":[26],"advantages,":[27],"FL":[28],"susceptible":[30],"to":[31,98,107,155,208,217],"backdoor":[32,144,186,214],"attacks,":[33],"attackers":[35],"insert":[36],"malicious":[37],"updates":[39,229],"into":[40],"aggregation":[43],"process.":[44],"Compromised":[45],"models":[46,210],"predict":[47],"attacker-chosen":[48],"targets":[49],"when":[50],"presented":[51],"with":[52],"specific":[53],"attacker-defined":[54],"inputs.":[55],"Backdoor":[56],"defences":[57,80,219],"generally":[58,88],"rely":[59],"anomaly":[61],"detection":[62],"techniques":[63,86],"based":[64],"Differential":[66],"Privacy":[67],"(DP)":[68],"or":[69,230],"require":[70,89,115,122],"legitimate":[71,116],"clean":[72,117,232],"test":[73],"examples":[74],"at":[75,234],"server.":[77,236],"Anomaly":[78],"detection-based":[79],"can":[81],"be":[82,131],"defeated":[83],"by":[84],"stealth":[85],"and":[87,128,199,211],"inspection":[90,225],"of":[91,102,143,150,177,226],"client-submitted":[92],"updates.":[94],"DP-based":[95],"approaches":[96],"tend":[97],"degrade":[99],"performance":[101],"trained":[104],"due":[106],"excessive":[108],"noise":[109],"addition":[110],"during":[111],"training.":[112],"Methods":[113],"that":[114,159,205],"data":[118,233],"server":[121],"strong":[123],"assumptions":[124],"about":[125],"task":[127],"may":[129],"not":[130],"applicable":[132],"in":[133],"real-world":[134],"settings.":[135],"In":[136],"this":[137],"work,":[138],"we":[139],"view":[140],"question":[142],"attack":[145,187],"robustness":[146],"through":[147],"lens":[149],"loss":[151,180],"function":[152],"optimal":[153],"points":[154],"build":[156],"defence":[158],"overcomes":[160],"these":[161],"limitations.":[162],"We":[163,184],"propose":[164],"Mode":[165],"Connectivity":[166],"Based":[167],"(MCFL),":[170],"which":[171],"leverages":[172],"recently":[174],"discovered":[175],"property":[176],"neural":[178],"network":[179],"surfaces,":[181],"mode":[182],"connectivity.":[183],"simulate":[185],"scenarios":[188],"using":[189],"computer":[190],"vision":[191],"benchmark":[192],"datasets,":[193],"including":[194],"CIFAR10,":[195],"Fashion":[196],"MNIST,":[197,198],"EMNIST.":[201],"Our":[202],"findings":[203],"show":[204],"MCFL":[206],"converges":[207],"high-quality":[209],"effectively":[212],"mitigates":[213],"attacks":[215],"relative":[216],"baseline":[218],"from":[220],"literature":[222],"requiring":[224],"client":[227],"assuming":[231]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
