{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:11:34Z","timestamp":1777655494888,"version":"3.51.4"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031726545","type":"print"},{"value":"9783031726552","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-72655-2_17","type":"book-chapter","created":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T10:12:47Z","timestamp":1733393567000},"page":"291-308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SKYMASK: Attack-Agnostic Robust Federated Learning with\u00a0Fine-Grained Learnable Masks"],"prefix":"10.1007","author":[{"given":"Peishen","family":"Yan","sequence":"first","affiliation":[]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Song","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Ruhui","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Ningxin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Haghighat","sequence":"additional","affiliation":[]},{"given":"Haibing","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,6]]},"reference":[{"key":"17_CR1","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V.: How to backdoor federated learning. In: Proceedings of the AISTATS (2020)"},{"key":"17_CR2","unstructured":"Baruch, G., Baruch, M., Goldberg, Y.: A little is enough: circumventing defenses for distributed learning. In: Proceedings of the NeurIPS (2019)"},{"key":"17_CR3","unstructured":"Bhagoji, A.N., Chakraborty, S., Mittal, P., Calo, S.: Analyzing federated learning through an adversarial lens. In: Proceedings of the ICML (2019)"},{"key":"17_CR4","unstructured":"Blanchard, P., El\u00a0Mhamdi, E.M., Guerraoui, R., Stainer, J.: Machine learning with adversaries: Byzantine tolerant gradient descent. In: Proceedings of the NeurIPS (2017)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Cao, X., Fang, M., Liu, J., Gong, N.Z.: FLTrust: Byzantine-robust federated learning via trust bootstrapping. In: Proceedings of the NDSS (2021)","DOI":"10.14722\/ndss.2021.24434"},{"key":"17_CR6","unstructured":"Dean, J., et al.: Large scale distributed deep networks. In: Proceedings of the NeurIPS (2012)"},{"key":"17_CR7","unstructured":"Fang, M., Cao, X., Jia, J., Gong, N.: Local model poisoning attacks to Byzantine-robust federated learning. In: Proceedings of the USENIX Security (2020)"},{"key":"17_CR8","unstructured":"Guerraoui, R., Rouault, S., et\u00a0al.: The hidden vulnerability of distributed learning in Byzantium. In: Proceedings of the ICML (2018)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Guo, H., et al.: Siren: Byzantine-robust federated learning via proactive alarming. In: Proceedings of the SoCC (2021)","DOI":"10.1145\/3472883.3486990"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Guo, P., Wang, P., Zhou, J., Jiang, S., Patel, V.M.: Multi-institutional collaborations for improving deep learning-based magnetic resonance image reconstruction using federated learning. In: Proceedings of the CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.00245"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Hsu, T.M.H., Qi, H., Brown, M.: Federated visual classification with real-world data distribution. In: Proceedings of the ECCV (2020)","DOI":"10.1007\/978-3-030-58607-2_5"},{"key":"17_CR12","unstructured":"Kamp, M., Fischer, J., Vreeken, J.: Federated learning from small datasets. In: Proceedings of the ICLR (2023)"},{"key":"17_CR13","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images. Technical report (2009)"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Li, A., Sun, J., Zeng, X., Zhang, M., Li, H., Chen, Y.: Fedmask: joint computation and communication-efficient personalized federated learning via heterogeneous masking. In: Proceedings of the SenSys (2021)","DOI":"10.1145\/3485730.3485929"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Li, H., et al.: 3DFED: adaptive and extensible framework for covert backdoor attack in federated learning. In: Proceedings of the IEEE S &P (2023)","DOI":"10.1109\/SP46215.2023.10179401"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Li, Q., Liu, Z., Li, Q., Xu, K.: martFL: enabling utility-driven data marketplace with a robust and verifiable federated learning architecture. In: Proceedings of the CCS (2023)","DOI":"10.1145\/3576915.3623134"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, X., Yang, L., Feng, L., Zhang, W., Gao, Y.: Diverse cotraining makes strong semi-supervised segmentor. In: ICCV (2023)","DOI":"10.1109\/ICCV51070.2023.01471"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Liu, J., et al.: Clip-driven universal model for organ segmentation and tumor detection. In: Proceedings of the CVPR (2023)","DOI":"10.1109\/ICCV51070.2023.01934"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Q., Chen, C., Qin, J., Dou, Q., Heng, P.A.: FedDG: federated domain generalization on medical image segmentation via episodic learning in continuous frequency space. In: Proceedings of the CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.00107"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Fedvision: an online visual object detection platform powered by federated learning. In: Proceedings of the AAAI (2020)","DOI":"10.1609\/aaai.v34i08.7021"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Lyu, X., et al.: Poisoning with cerberus: stealthy and colluded backdoor attack against federated learning. In: Proceedings of the AAAI (2023)","DOI":"10.1609\/aaai.v37i7.26083"},{"key":"17_CR22","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Proceedings of the AISTATS (2017)"},{"key":"17_CR23","doi-asserted-by":"publisher","first-page":"2848","DOI":"10.1109\/TIFS.2022.3196274","volume":"17","author":"Y Miao","year":"2022","unstructured":"Miao, Y., Liu, Z., Li, H., Choo, K.K.R., Deng, R.H.: Privacy-preserving Byzantine-robust federated learning via blockchain systems. IEEE Trans. Inf. Forensics Secur. 17, 2848\u20132861 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR24","unstructured":"Nguyen, T.D., et\u00a0al.: FLAME: taming backdoors in federated learning. In: Proceedings of the USENIX Security (2022)"},{"key":"17_CR25","unstructured":"Nguyen, T.D., Nguyen, T.A., Tran, A., Doan, K.D., Wong, K.S.: IBA: towards irreversible backdoor attacks in federated learning. In: Proceedings of the NeurIPS (2024)"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Qureshi, N.B.S., Kim, D.H., Lee, J., Lee, E.K.: On the performance impact of poisoning attacks on load forecasting in federated learning. In: Proceedings of the UbiComp (2021)","DOI":"10.1145\/3460418.3479285"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Rieger, P., Nguyen, T.D., Miettinen, M., Sadeghi, A.R.: Deepsight: mitigating backdoor attacks in federated learning through deep model inspection. In: Proceedings of the NDSS (2022)","DOI":"10.14722\/ndss.2022.23156"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Shejwalkar, V., Houmansadr, A.: Manipulating the Byzantine: optimizing model poisoning attacks and defenses for federated learning. In: Proceedings of the NDSS (2021)","DOI":"10.14722\/ndss.2021.24498"},{"key":"17_CR29","unstructured":"Sun, Z., Kairouz, P., Suresh, A.T., McMahan, H.B.: Can you really backdoor federated learning? arXiv preprint arXiv:1911.07963 (2019)"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Tolpegin, V., Truex, S., Gursoy, M.E., Liu, L.: Data poisoning attacks against federated learning systems. In: Proceedings of the ESORICS (2020)","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Wang, J., Guo, S., Xie, X., Qi, H.: Protect privacy from gradient leakage attack in federated learning. In: INFOCOM (2022)","DOI":"10.1109\/INFOCOM48880.2022.9796841"},{"key":"17_CR32","unstructured":"Xie, C., Huang, K., Chen, P.Y., Li, B.: DBA: distributed backdoor attacks against federated learning. In: Proceedings of the ICLR (2019)"},{"key":"17_CR33","unstructured":"Yin, D., Chen, Y., Kannan, R., Bartlett, P.: Byzantine-robust distributed learning: towards optimal statistical rates. In: Proceedings of the ICML (2018)"},{"key":"17_CR34","unstructured":"Zhang, H., Jia, J., Chen, J., Lin, L., Wu, D.: A3FL: adversarially adaptive backdoor attacks to federated learning. In: Proceedings of the AAAI (2024)"},{"key":"17_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, L., Luo, Y., Bai, Y., Du, B., Duan, L.Y.: Federated learning for non-IID data via unified feature learning and optimization objective alignment. In: ICCV (2021)","DOI":"10.1109\/ICCV48922.2021.00438"},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Cao, X., Jia, J., Gong, N.Z.: Fldetector: defending federated learning against model poisoning attacks via detecting malicious clients. In: Proceedings of the KDD (2022)","DOI":"10.1145\/3534678.3539231"},{"key":"17_CR37","unstructured":"Zhou, H., Lan, J., Liu, R., Yosinski, J.: Deconstructing lottery tickets: zeros, signs, and the supermask. In: Proceedings of the NeurIPS (2019)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72655-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T11:31:06Z","timestamp":1733398266000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72655-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"ISBN":["9783031726545","9783031726552"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72655-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"6 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}