{"id":"https://openalex.org/W4415428597","doi":"https://doi.org/10.3233/faia250939","title":"IPBA: Imperceptible Perturbation Backdoor Attack in Federated Self-Supervised Learning","display_name":"IPBA: Imperceptible Perturbation Backdoor Attack in Federated Self-Supervised Learning","publication_year":2025,"publication_date":"2025-10-21","ids":{"openalex":"https://openalex.org/W4415428597","doi":"https://doi.org/10.3233/faia250939"},"language":null,"primary_location":{"id":"doi:10.3233/faia250939","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia250939","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/faia250939","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062986986","display_name":"Jiayao Wang","orcid":"https://orcid.org/0000-0003-4128-8541"},"institutions":[{"id":"https://openalex.org/I78978612","display_name":"Yangzhou University","ror":"https://ror.org/03tqb8s11","country_code":"CN","type":"education","lineage":["https://openalex.org/I78978612"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiayao Wang","raw_affiliation_strings":["School of Information Engineering, Yangzhou University, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Yangzhou University, China","institution_ids":["https://openalex.org/I78978612"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058470061","display_name":"Yang Song","orcid":"https://orcid.org/0000-0001-5297-3072"},"institutions":[{"id":"https://openalex.org/I78978612","display_name":"Yangzhou University","ror":"https://ror.org/03tqb8s11","country_code":"CN","type":"education","lineage":["https://openalex.org/I78978612"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Song","raw_affiliation_strings":["School of Information Engineering, Yangzhou University, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Yangzhou University, China","institution_ids":["https://openalex.org/I78978612"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102965387","display_name":"Zhendong Zhao","orcid":"https://orcid.org/0009-0005-7906-5425"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhendong Zhao","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100744176","display_name":"Jiale Zhang","orcid":"https://orcid.org/0000-0002-2143-5666"},"institutions":[{"id":"https://openalex.org/I78978612","display_name":"Yangzhou University","ror":"https://ror.org/03tqb8s11","country_code":"CN","type":"education","lineage":["https://openalex.org/I78978612"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiale Zhang","raw_affiliation_strings":["School of Information Engineering, Yangzhou University, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Yangzhou University, China","institution_ids":["https://openalex.org/I78978612"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100751130","display_name":"Junwu Zhu","orcid":"https://orcid.org/0000-0001-5810-613X"},"institutions":[{"id":"https://openalex.org/I78978612","display_name":"Yangzhou University","ror":"https://ror.org/03tqb8s11","country_code":"CN","type":"education","lineage":["https://openalex.org/I78978612"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junwu Zhu","raw_affiliation_strings":["School of Information Engineering, Yangzhou University, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Yangzhou University, China","institution_ids":["https://openalex.org/I78978612"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089198043","display_name":"Qilin Wu","orcid":"https://orcid.org/0000-0002-4559-9315"},"institutions":[{"id":"https://openalex.org/I4210164862","display_name":"Artificial Intelligence in Medicine (Canada)","ror":"https://ror.org/05p590m36","country_code":"CA","type":"company","lineage":["https://openalex.org/I4210164862"]},{"id":"https://openalex.org/I46520130","display_name":"Chaohu University","ror":"https://ror.org/00mwds915","country_code":"CN","type":"education","lineage":["https://openalex.org/I46520130"]}],"countries":["CA","CN"],"is_corresponding":false,"raw_author_name":"Qilin Wu","raw_affiliation_strings":["School of Computing and Artificial Intelligence, Chaohu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Chaohu University, China","institution_ids":["https://openalex.org/I46520130","https://openalex.org/I4210164862"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109509130","display_name":"Dongfang Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210150356","display_name":"University of Washington Tacoma","ror":"https://ror.org/05n8t2628","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701","https://openalex.org/I4210150356"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dongfang Zhao","raw_affiliation_strings":["Tacoma School of Engineering and Technology, University of Washington, USA"],"affiliations":[{"raw_affiliation_string":"Tacoma School of Engineering and Technology, University of Washington, USA","institution_ids":["https://openalex.org/I4210150356"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5062986986"],"corresponding_institution_ids":["https://openalex.org/I78978612"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.50735964,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9656000137329102,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9656000137329102,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.963699996471405,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9584000110626221,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9980999827384949},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.680400013923645},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6632000207901001},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.48010000586509705},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.37860000133514404},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.30640000104904175}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9980999827384949},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6970999836921692},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.680400013923645},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6632000207901001},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.48010000586509705},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4433000087738037},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.37860000133514404},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32989999651908875},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.30640000104904175},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.30630001425743103},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.2969000041484833},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2957000136375427},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2946000099182129},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.28439998626708984},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.2581999897956848}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia250939","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia250939","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia250939","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia250939","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0],"Self-Supervised":[1],"Learning":[2],"(FSSL)":[3],"combines":[4],"the":[5,56,111,127,141,149],"advantages":[6],"of":[7,92,115,130,144],"decentralized":[8],"modeling":[9],"and":[10,24,60,72,104,113,132,135,160,173],"unlabeled":[11],"representation":[12],"learning,":[13],"serving":[14],"as":[15],"a":[16,90],"cutting-edge":[17],"paradigm":[18],"with":[19,101],"strong":[20,175],"potential":[21],"for":[22,58],"scalability":[23],"privacy":[25],"preservation.":[26],"Although":[27],"FSSL":[28,158],"has":[29],"garnered":[30],"increasing":[31],"attention,":[32],"research":[33],"indicates":[34],"that":[35,85,163],"it":[36,52],"remains":[37],"vulnerable":[38],"to":[39,54,139],"backdoor":[40,74,117,131,145,168],"attacks.":[41],"Existing":[42],"methods":[43,170],"generally":[44],"rely":[45],"on":[46,156],"visually":[47],"obvious":[48],"triggers,":[49],"which":[50],"makes":[51],"difficult":[53],"meet":[55],"requirements":[57],"stealth":[59],"practicality":[61],"in":[62,94,119,171],"real-world":[63],"deployment.":[64],"In":[65],"this":[66],"paper,":[67],"we":[68],"propose":[69],"an":[70],"imperceptible":[71,87],"effective":[73],"attack":[75,169],"method":[76],"against":[77],"FSSL,":[78,95],"called":[79],"IPBA.":[80],"Our":[81,153],"empirical":[82],"study":[83],"reveals":[84],"existing":[86,167],"triggers":[88],"face":[89],"series":[91],"challenges":[93],"particularly":[96],"limited":[97],"transferability,":[98],"feature":[99,128],"entanglement":[100],"augmented":[102,133],"samples,":[103,134,146],"out-of-distribution":[105,142],"properties.":[106],"These":[107],"issues":[108],"collectively":[109],"undermine":[110],"effectiveness":[112],"stealthiness":[114],"traditional":[116],"attacks":[118],"FSSL.":[120],"To":[121],"overcome":[122],"these":[123],"challenges,":[124],"IPBA":[125,164],"decouples":[126],"distributions":[129],"introduces":[136],"Sliced-Wasserstein":[137],"distance":[138],"mitigate":[140],"properties":[143],"thereby":[147],"optimizing":[148],"trigger":[150],"generation":[151],"process.":[152],"experimental":[154],"results":[155],"several":[157],"scenarios":[159],"datasets":[161],"show":[162],"significantly":[165],"outperforms":[166],"performance":[172],"exhibits":[174],"robustness":[176],"under":[177],"various":[178],"defense":[179],"mechanisms.":[180]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-24T00:00:00"}
