{"id":"https://openalex.org/W4414360327","doi":"https://doi.org/10.24963/ijcai.2025/559","title":"FedDLAD: A Federated Learning Dual-Layer Anomaly Detection Framework for Enhancing Resilience Against Backdoor Attacks","display_name":"FedDLAD: A Federated Learning Dual-Layer Anomaly Detection Framework for Enhancing Resilience Against Backdoor Attacks","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4414360327","doi":"https://doi.org/10.24963/ijcai.2025/559"},"language":"en","primary_location":{"id":"doi:10.24963/ijcai.2025/559","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/559","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102635871","display_name":"Binbin Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]},{"id":"https://openalex.org/I890469752","display_name":"Ministry of Industry and Information Technology","ror":"https://ror.org/0385nmy68","country_code":"CN","type":"government","lineage":["https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Binbin Ding","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics","MIIT Key Laboratory of Pattern Analysis and Machine Intelligence, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"MIIT Key Laboratory of Pattern Analysis and Machine Intelligence, Nanjing, China","institution_ids":["https://openalex.org/I890469752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102968204","display_name":"Penghui Yang","orcid":"https://orcid.org/0009-0003-3626-5094"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Penghui Yang","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103204774","display_name":"Sheng-Jun Huang","orcid":"https://orcid.org/0000-0002-7673-5367"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]},{"id":"https://openalex.org/I890469752","display_name":"Ministry of Industry and Information Technology","ror":"https://ror.org/0385nmy68","country_code":"CN","type":"government","lineage":["https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng-Jun Huang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics","MIIT Key Laboratory of Pattern Analysis and Machine Intelligence, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"MIIT Key Laboratory of Pattern Analysis and Machine Intelligence, Nanjing, China","institution_ids":["https://openalex.org/I890469752"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102635871"],"corresponding_institution_ids":["https://openalex.org/I890469752","https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":1.4161,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.86399699,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"5021","last_page":"5029"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9919999837875366},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6832000017166138},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6326000094413757},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.554099977016449},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.5311999917030334},{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.5098999738693237},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.44589999318122864},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.4099000096321106}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9919999837875366},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7702000141143799},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6945000290870667},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6832000017166138},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6326000094413757},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.554099977016449},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.5311999917030334},{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.5098999738693237},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.44589999318122864},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.4099000096321106},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.375900000333786},{"id":"https://openalex.org/C2779797433","wikidata":"https://www.wikidata.org/wiki/Q632959","display_name":"Blacklisting","level":2,"score":0.32760000228881836},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.30970001220703125},{"id":"https://openalex.org/C59577422","wikidata":"https://www.wikidata.org/wiki/Q10265143","display_name":"False accusation","level":2,"score":0.3012999892234802},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2980000078678131},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.27869999408721924},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27250000834465027},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26759999990463257},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.26759999990463257},{"id":"https://openalex.org/C132010649","wikidata":"https://www.wikidata.org/wiki/Q189222","display_name":"Intuition","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.25369998812675476},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.2533000111579895},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.25290000438690186},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.2508000135421753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.24963/ijcai.2025/559","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/559","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"Federated":[1,92],"Learning":[2,93],"(FL),":[3],"the":[4,37,45,49,53,73,108,137,141,148,152,161,171],"decentralized":[5],"nature":[6],"of":[7,77,120,143,178],"client":[8],"training":[9],"introduces":[10],"vulnerabilities,":[11],"notably":[12],"backdoor":[13,103,192],"attacks.":[14,104],"Prevailing":[15],"anomaly":[16],"detection":[17],"approaches":[18],"typically":[19],"perform":[20,115],"binary":[21],"classification,":[22],"dividing":[23],"clients":[24,42,61,121,159],"into":[25],"trusted":[26,46,149],"and":[27,52,67,75,169],"untrusted":[28,66,162],"groups.":[29],"However,":[30],"these":[31,86],"methods":[32],"face":[33],"two":[34],"critical":[35],"challenges:":[36],"insider":[38,138],"threat,":[39],"where":[40,56],"malicious":[41,145],"concealed":[43],"within":[44,147],"group":[47],"compromise":[48],"global":[50],"model,":[51],"benign":[54,60,158,172],"exclusion,":[55],"legitimate":[57],"contributions":[58,168],"from":[59,160],"are":[62],"mistakenly":[63],"classified":[64],"as":[65],"disregarded.":[68],"These":[69],"issues":[70],"weaken":[71],"both":[72],"robustness":[74],"fairness":[76],"FL":[78],"systems,":[79],"exposing":[80],"inherent":[81],"defense":[82],"vulnerabilities.":[83],"To":[84],"address":[85],"challenges,":[87],"we":[88],"propose":[89],"FedDLAD,":[90],"a":[91,116],"Dual-Layer":[94],"Anomaly":[95],"Detection":[96],"framework":[97,106],"designed":[98],"to":[99,114,190],"enhance":[100],"resilience":[101],"against":[102,180],"The":[105,127],"leverages":[107],"Connectivity-Based":[109],"Outlier":[110],"Factor":[111],"(COF)":[112],"module":[113,131,154],"robust":[117,198],"initial":[118],"classification":[119],"by":[122,135],"analyzing":[123],"structural":[124],"data":[125],"connectivity.":[126],"Interquartile":[128],"Range":[129],"(IQR)":[130],"further":[132],"reinforces":[133],"this":[134],"mitigating":[136],"threat":[139],"through":[140],"removal":[142],"residual":[144],"influences":[146],"group.":[150],"Furthermore,":[151],"Pardon":[153],"dynamically":[155],"reintegrates":[156],"misclassified":[157],"group,":[163],"thereby":[164],"preserving":[165],"their":[166],"valuable":[167],"addressing":[170],"exclusion.":[173],"We":[174],"conduct":[175],"extensive":[176],"evaluations":[177],"FedDLAD":[179],"state-of-the-art":[181],"defenses":[182],"on":[183],"real-world":[184],"datasets,":[185],"demonstrating":[186],"its":[187],"superior":[188],"ability":[189],"reduce":[191],"attack":[193],"success":[194],"rates":[195],"while":[196],"maintaining":[197],"model":[199],"performance.":[200],"Code":[201],"is":[202],"available":[203],"at:":[204],"https://github.com/dingbinb/FedDLAD.":[205]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
