{"id":"https://openalex.org/W4405170795","doi":"https://doi.org/10.1145/3658644.3690187","title":"Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses","display_name":"Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405170795","doi":"https://doi.org/10.1145/3658644.3690187"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3690187","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690187","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690187","source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690187","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101938688","display_name":"Yuxin Yang","orcid":"https://orcid.org/0000-0002-9907-9980"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]},{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN","US"],"is_corresponding":true,"raw_author_name":"Yuxin Yang","raw_affiliation_strings":["College of Computer Science and Technology, Jilin University &amp; Department of Computer Science, Illinois Institute of Technology, Changchun, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Jilin University &amp; Department of Computer Science, Illinois Institute of Technology, Changchun, China","institution_ids":["https://openalex.org/I180949307","https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100429898","display_name":"Qiang Li","orcid":"https://orcid.org/0000-0001-7510-4718"},"institutions":[{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]},{"id":"https://openalex.org/I4210134929","display_name":"Jilin Province Science and Technology Department","ror":"https://ror.org/049x38272","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210134929"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiang Li","raw_affiliation_strings":["College of Computer Science and Technology, Jilin University, Changchun, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Jilin University, Changchun, China","institution_ids":["https://openalex.org/I4210134929","https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006298897","display_name":"Jinyuan Jia","orcid":"https://orcid.org/0000-0002-9785-7769"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jinyuan Jia","raw_affiliation_strings":["College of Information Sciences and Technology, The Pennsylvania State University, University Park, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, The Pennsylvania State University, University Park, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100725148","display_name":"Yuan Hong","orcid":"https://orcid.org/0000-0003-4095-4506"},"institutions":[{"id":"https://openalex.org/I140172145","display_name":"University of Connecticut","ror":"https://ror.org/02der9h97","country_code":"US","type":"education","lineage":["https://openalex.org/I140172145"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuan Hong","raw_affiliation_strings":["School of Computing, University of Connecticut, Storrs, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Connecticut, Storrs, USA","institution_ids":["https://openalex.org/I140172145"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101789833","display_name":"Binghui Wang","orcid":"https://orcid.org/0000-0001-5616-060X"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Binghui Wang","raw_affiliation_strings":["Department of Computer Science, Illinois Institute of Technology, Chicago, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Illinois Institute of Technology, Chicago, USA","institution_ids":["https://openalex.org/I180949307"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101938688"],"corresponding_institution_ids":["https://openalex.org/I180949307","https://openalex.org/I194450716"],"apc_list":null,"apc_paid":null,"fwci":2.732,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91769351,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"2829","last_page":"2843"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.96714848279953},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.7705330848693848},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6923647522926331},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.617414653301239},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4508667588233948},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2824632525444031},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.056877583265304565}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.96714848279953},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.7705330848693848},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6923647522926331},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.617414653301239},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4508667588233948},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2824632525444031},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.056877583265304565},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3690187","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690187","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690187","source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3690187","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690187","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690187","source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1380307869","display_name":null,"funder_award_id":"62072208","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"},{"id":"https://openalex.org/G3480868263","display_name":null,"funder_award_id":"CNS-2302689, CNS-2308730, CNS-2319277, CMMI-2326341, ECCS-2216926, CNS-2241713, CNS-2331302 and CNS-2339686","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4405170795.pdf"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W2624801495","https://openalex.org/W2768181417","https://openalex.org/W2807021761","https://openalex.org/W2907492528","https://openalex.org/W2934843808","https://openalex.org/W2962939738","https://openalex.org/W2970929262","https://openalex.org/W2998293245","https://openalex.org/W3006236094","https://openalex.org/W3007332492","https://openalex.org/W3010216907","https://openalex.org/W3034414373","https://openalex.org/W3100848837","https://openalex.org/W3109235236","https://openalex.org/W3127520698","https://openalex.org/W3152893301","https://openalex.org/W3167334189","https://openalex.org/W3171412022","https://openalex.org/W3175919946","https://openalex.org/W3214714397","https://openalex.org/W3215670835","https://openalex.org/W4221155263","https://openalex.org/W4226092233","https://openalex.org/W4226255806","https://openalex.org/W4226550712","https://openalex.org/W4252973173","https://openalex.org/W4281686206","https://openalex.org/W4285206772","https://openalex.org/W4287829537","https://openalex.org/W4290948380","https://openalex.org/W4306179629","https://openalex.org/W4312996082","https://openalex.org/W4318822841","https://openalex.org/W4360995550","https://openalex.org/W4367046855","https://openalex.org/W4382318655","https://openalex.org/W4384948739","https://openalex.org/W4385152093","https://openalex.org/W4385679845","https://openalex.org/W4402264369"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4401407399"],"abstract_inverted_index":{"Federated":[0],"graph":[1,16],"learning":[2,8],"(FedGL)":[3],"is":[4,71],"an":[5],"emerging":[6],"federated":[7],"(FL)":[9],"framework":[10],"that":[11,48],"extends":[12],"FL":[13,25,52],"to":[14,31,34],"learn":[15],"data":[17,28,46,58],"from":[18],"diverse":[19],"sources":[20],"without":[21],"accessing":[22],"the":[23,44,49,56,60,63],"data.":[24],"for":[26],"non-graph":[27],"has":[29],"shown":[30],"be":[32],"vulnerable":[33],"backdoor":[35,41,69],"attacks,":[36],"which":[37],"inject":[38],"a":[39],"shared":[40],"trigger":[42,61],"into":[43],"training":[45],"such":[47],"trained":[50],"backdoored":[51],"model":[53],"can":[54],"predict":[55],"testing":[57],"containing":[59],"as":[62],"attacker":[64],"desires.":[65],"However,":[66],"FedGL":[67],"against":[68],"attacks":[70],"largely":[72],"unexplored,":[73],"and":[74],"no":[75],"effective":[76],"defense":[77],"exists.":[78]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":5}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
