{"id":"https://openalex.org/W4409657411","doi":"https://doi.org/10.1145/3696410.3714630","title":"NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on Adaptive Perturbation on Federated Graph Learning","display_name":"NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on Adaptive Perturbation on Federated Graph Learning","publication_year":2025,"publication_date":"2025-04-22","ids":{"openalex":"https://openalex.org/W4409657411","doi":"https://doi.org/10.1145/3696410.3714630"},"language":"en","primary_location":{"id":"doi:10.1145/3696410.3714630","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3696410.3714630","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3696410.3714630","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Web Conference 2025","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3696410.3714630","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110463162","display_name":"Ken Li","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ken Li","raw_affiliation_strings":["School of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China and Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China and Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003001715","display_name":"Bin Shi","orcid":"https://orcid.org/0000-0001-8272-9361"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Shi","raw_affiliation_strings":["School of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China and Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China and Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jiazhe Wei","orcid":"https://orcid.org/0009-0006-3983-5170"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiazhe Wei","raw_affiliation_strings":["School of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China and Shaanxi Province Key Laboratory of Big Data Knowledge Engineering, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China and Shaanxi Province Key Laboratory of Big Data Knowledge Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035080566","display_name":"Bo Dong","orcid":"https://orcid.org/0000-0001-7695-9072"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Dong","raw_affiliation_strings":["School of Distance Education, Xi'an Jiaotong University, Xi'an, China and Shaanxi Province Key Laboratory of Big Data Knowledge Engineering, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Distance Education, Xi'an Jiaotong University, Xi'an, China and Shaanxi Province Key Laboratory of Big Data Knowledge Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5110463162"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03560679,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"852","last_page":"862"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.8911911249160767},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6890396475791931},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4612407386302948},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37511008977890015},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34953945875167847},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2797679901123047}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.8911911249160767},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6890396475791931},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4612407386302948},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37511008977890015},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34953945875167847},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2797679901123047}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3696410.3714630","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3696410.3714630","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3696410.3714630","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Web Conference 2025","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3696410.3714630","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3696410.3714630","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3696410.3714630","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Web Conference 2025","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.7900000214576721,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[{"id":"https://openalex.org/G1770450365","display_name":null,"funder_award_id":"62302380","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3235401080","display_name":null,"funder_award_id":"62037001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6425279911","display_name":null,"funder_award_id":"62476215","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4409657411.pdf","grobid_xml":"https://content.openalex.org/works/W4409657411.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W2914721378","https://openalex.org/W3009901425","https://openalex.org/W3038022836","https://openalex.org/W3042368254","https://openalex.org/W3099064659","https://openalex.org/W3167334189","https://openalex.org/W3190469032","https://openalex.org/W3211531381","https://openalex.org/W4212835176","https://openalex.org/W4221155263","https://openalex.org/W4226092233","https://openalex.org/W4252973173","https://openalex.org/W4281686206","https://openalex.org/W4283814689","https://openalex.org/W4284682762","https://openalex.org/W4290945652","https://openalex.org/W4308410017","https://openalex.org/W4311081005","https://openalex.org/W4318822841","https://openalex.org/W4323066547","https://openalex.org/W4385484684","https://openalex.org/W4388723845","https://openalex.org/W4391661565","https://openalex.org/W4398157294","https://openalex.org/W4401856724","https://openalex.org/W6601013545","https://openalex.org/W6759238902"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4401407399"],"abstract_inverted_index":{"Federated":[0,7],"Graph":[1,22],"Learning":[2,8],"(FedGL)":[3],"is":[4,88],"an":[5],"emerging":[6],"(FL)":[9],"framework":[10],"that":[11],"learns":[12],"the":[13,30,71,109,114,126,132,135],"graph":[14],"data":[15,73],"from":[16,125],"various":[17],"clients":[18,116],"to":[19,27,39,101],"train":[20],"better":[21],"Neural":[23],"Networks(GNNs)":[24],"model.":[25],"Owing":[26],"concerns":[28],"regarding":[29],"security":[31],"of":[32,74,105,134],"such":[33],"framework,":[34],"numerous":[35],"studies":[36],"have":[37],"attempted":[38],"execute":[40],"backdoor":[41,51,59,68,110],"attacks":[42],"on":[43,49,61,65,84],"FedGL,":[44],"with":[45,94],"a":[46],"particular":[47],"focus":[48,64],"distributed":[50,58,67],"attacks.":[52],"However,":[53],"all":[54],"existing":[55],"methods":[56],"posting":[57],"attack":[60],"FedGL":[62],"only":[63],"injecting":[66],"triggers":[69],"into":[70],"training":[72],"each":[75],"malicious":[76,115],"client,":[77],"which":[78,129],"will":[79],"cause":[80],"model":[81],"performance":[82,133],"degradation":[83],"original":[85],"task":[86],"and":[87],"not":[89],"always":[90],"effective":[91],"when":[92],"confronted":[93],"robust":[95],"federated":[96],"learning":[97],"defense":[98],"algorithms,":[99],"leading":[100],"low":[102],"success":[103],"rate":[104],"attack.":[106,136],"What's":[107],"more,":[108],"signals":[111,124],"introduced":[112],"by":[113,121],"may":[117],"be":[118],"smoothed":[119],"out":[120],"other":[122],"clean":[123],"honest":[127],"clients,":[128],"potentially":[130],"undermining":[131]},"counts_by_year":[],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
