{"id":"https://openalex.org/W4387185397","doi":"https://doi.org/10.3233/faia230393","title":"FedPerturb: Covert Poisoning Attack on Federated Learning via Partial Perturbation","display_name":"FedPerturb: Covert Poisoning Attack on Federated Learning via Partial Perturbation","publication_year":2023,"publication_date":"2023-09-28","ids":{"openalex":"https://openalex.org/W4387185397","doi":"https://doi.org/10.3233/faia230393"},"language":"en","primary_location":{"id":"doi:10.3233/faia230393","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3233/faia230393","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA230393","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA230393","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113011738","display_name":"Tongsai Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tongsai Jin","raw_affiliation_strings":["MoE Engineering Research Center of SW/HW Co-design Technology and Application, East China Normal University, Shanghai, China","Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"MoE Engineering Research Center of SW/HW Co-design Technology and Application, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100460010","display_name":"Zhihui Fu","orcid":"https://orcid.org/0000-0002-8525-0847"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhihui Fu","raw_affiliation_strings":["OPPO Research Institute"],"affiliations":[{"raw_affiliation_string":"OPPO Research Institute","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101525319","display_name":"Dan Meng","orcid":"https://orcid.org/0000-0003-1980-9283"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dan Meng","raw_affiliation_strings":["OPPO Research Institute"],"affiliations":[{"raw_affiliation_string":"OPPO Research Institute","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100384682","display_name":"Jun Wang","orcid":"https://orcid.org/0000-0002-0926-4761"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jun Wang","raw_affiliation_strings":["OPPO Research Institute"],"affiliations":[{"raw_affiliation_string":"OPPO Research Institute","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100747624","display_name":"Yue Qi","orcid":"https://orcid.org/0000-0001-5331-1193"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yue Qi","raw_affiliation_strings":["OPPO Research Institute"],"affiliations":[{"raw_affiliation_string":"OPPO Research Institute","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027627793","display_name":"Guitao Cao","orcid":"https://orcid.org/0000-0002-4059-4806"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guitao Cao","raw_affiliation_strings":["MoE Engineering Research Center of SW/HW Co-design Technology and Application, East China Normal University, Shanghai, China","Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"MoE Engineering Research Center of SW/HW Co-design Technology and Application, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5027627793"],"corresponding_institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35525678,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11775","display_name":"COVID-19 diagnosis using AI","score":0.9289000034332275,"subfield":{"id":"https://openalex.org/subfields/2741","display_name":"Radiology, Nuclear Medicine and Imaging"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7169379591941833},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6633623242378235},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.6392837762832642},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6174925565719604},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5202323198318481},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.286005437374115},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07263582944869995}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7169379591941833},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6633623242378235},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.6392837762832642},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6174925565719604},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5202323198318481},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.286005437374115},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07263582944869995},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia230393","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3233/faia230393","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA230393","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia230393","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3233/faia230393","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA230393","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4387185397.pdf","grobid_xml":"https://content.openalex.org/works/W4387185397.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W1686810756","https://openalex.org/W2163605009","https://openalex.org/W2541884796","https://openalex.org/W2618530766","https://openalex.org/W2750384547","https://openalex.org/W2750650104","https://openalex.org/W2752689052","https://openalex.org/W2788816110","https://openalex.org/W2789911054","https://openalex.org/W2794878842","https://openalex.org/W2810065831","https://openalex.org/W2913452160","https://openalex.org/W2922259313","https://openalex.org/W2949522309","https://openalex.org/W2962763344","https://openalex.org/W2964043980","https://openalex.org/W2966002286","https://openalex.org/W2966757932","https://openalex.org/W2990614164","https://openalex.org/W2995164118","https://openalex.org/W3041107652","https://openalex.org/W3048715803","https://openalex.org/W3114131478","https://openalex.org/W3117599504","https://openalex.org/W3118608800","https://openalex.org/W3138153888","https://openalex.org/W3138597937","https://openalex.org/W3166632800","https://openalex.org/W4286588487","https://openalex.org/W4287725452","https://openalex.org/W4288277757","https://openalex.org/W4288578176","https://openalex.org/W4290875695","https://openalex.org/W4290948380","https://openalex.org/W4293791267","https://openalex.org/W4312231739","https://openalex.org/W4313042326","https://openalex.org/W4318619660"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2523525694","https://openalex.org/W2727423897","https://openalex.org/W2998642566","https://openalex.org/W2497612952","https://openalex.org/W2392682561","https://openalex.org/W57793151","https://openalex.org/W4247948804","https://openalex.org/W2804882289","https://openalex.org/W4320017490"],"abstract_inverted_index":{"Federated":[0],"learning":[1,18,114],"breaks":[2],"through":[3],"the":[4,22,33,40,47,50,56,64,75,83,92,97,112,117,125,141,156],"barrier":[5],"of":[6,24,35,49,89,124],"data":[7],"owners":[8],"by":[9],"allowing":[10],"them":[11],"to":[12,62],"collaboratively":[13],"train":[14],"a":[15,86,121,174],"federated":[16,113],"machine":[17],"model":[19,42,128],"without":[20],"compromising":[21],"privacy":[23],"their":[25],"own":[26],"data.":[27],"However,":[28,71],"Federation":[29],"Learning":[30],"also":[31],"faces":[32],"threat":[34],"poisoning":[36,57,109],"attacks,":[37,58],"especially":[38],"from":[39],"client":[41,165,176],"updates,":[43],"which":[44],"may":[45,95],"impair":[46],"accuracy":[48],"global":[51,98],"model.":[52],"To":[53],"defend":[54],"against":[55],"previous":[59],"work":[60],"aims":[61],"identify":[63,82],"malicious":[65,164,175],"updates":[66],"in":[67,77,85],"high":[68,78,146],"dimensional":[69,79],"spaces.":[70],"we":[72,105],"find":[73],"that":[74,140],"distances":[76],"spaces":[80],"cannot":[81],"changes":[84,94],"small":[87,93,122],"subset":[88,123],"dimensions,":[90],"and":[91,130,167],"affect":[96],"models":[99],"severely.":[100],"Based":[101],"on":[102,120,150],"this":[103],"finding,":[104],"propose":[106],"an":[107],"untargeted":[108],"attack":[110,133,143,147,158],"under":[111],"setting":[115],"via":[116],"partial":[118],"perturbations":[119],"carefully":[126],"selected":[127],"parameters,":[129],"present":[131],"two":[132],"object":[134],"selection":[135],"strategies.":[136],"We":[137],"experimentally":[138],"demonstrate":[139],"proposed":[142,157],"scheme":[144,159],"achieves":[145],"success":[148],"rate":[149],"five":[151],"state-of-the-art":[152],"defense":[153,171],"schemes.":[154],"Furthermore,":[155],"remains":[160],"effective":[161],"at":[162],"low":[163,179],"ratios":[166],"still":[168],"circumvents":[169],"three":[170],"schemes":[172],"with":[173],"ratio":[177],"as":[178,180],"2%.":[181]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
