{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T13:33:59Z","timestamp":1772199239476,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819529605","type":"print"},{"value":"9789819529612","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2961-2_10","type":"book-chapter","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:01:55Z","timestamp":1760364115000},"page":"185-201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AdvPurge: A Robust Personalized Federated Learning Framework Against Backdoor Attack"],"prefix":"10.1007","author":[{"given":"Tu","family":"Huang","sequence":"first","affiliation":[]},{"given":"Na","family":"Ruan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,10]]},"reference":[{"key":"10_CR1","unstructured":"McMahan, B.,\u00a0Moore, E.,\u00a0Ramage, D.,\u00a0Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp.\u00a01273\u20131282. PMLR (2017)"},{"key":"10_CR2","first-page":"3557","volume":"33","author":"A Fallah","year":"2020","unstructured":"Fallah, A., Mokhtari, A., Ozdaglar, A.: Personalized federated learning with theoretical guarantees: a model-agnostic meta-learning approach. Adv. Neural. Inf. Process. Syst. 33, 3557\u20133568 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10_CR3","unstructured":"Collins, L.,\u00a0Hassani, H.,\u00a0Mokhtari, A.,\u00a0Shakkottai, S.: Exploiting shared representations for personalized federated learning. In: International Conference on Machine Learning, pp.\u00a02089\u20132099. PMLR (2021)"},{"key":"10_CR4","unstructured":"Li, X.,\u00a0Jiang, M.,\u00a0Zhang, X.,\u00a0Kamp, M.,\u00a0Dou, Q.: Fedbn: federated learning on non-iid features via local batch normalization. arXiv preprint arXiv:2102.07623 (2021)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Tan, Y., et al.: Fedproto: federated prototype learning across heterogeneous clients. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 36, pp. 8432\u20138440 (2022)","DOI":"10.1609\/aaai.v36i8.20819"},{"key":"10_CR6","unstructured":"Bagdasaryan, E.,\u00a0Veit, A.,\u00a0Hua, Y.,\u00a0Estrin, D.,\u00a0Shmatikov, V.: How to backdoor federated learning. In: International Conference on Artificial Intelligence and Statistics, pp.\u00a02938\u20132948. PMLR (2020)"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., Liu, K., Dolan-Gavitt, B., Garg, S.: Badnets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"issue":"5","key":"10_CR8","doi-asserted-by":"publisher","first-page":"4559","DOI":"10.1109\/TDSC.2024.3354049","volume":"21","author":"J Zhang","year":"2024","unstructured":"Zhang, J., et al.: Badcleaner: defending backdoor attacks in federated learning via attention-based multi-teacher distillation. IEEE Trans. Dependable Secure Comput. 21(5), 4559\u20134573 (2024)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"4752","DOI":"10.1109\/TIFS.2024.3384846","volume":"19","author":"J Zhang","year":"2024","unstructured":"Zhang, J., et al.: FLPurifier: backdoor defense in federated learning via decoupled contrastive training. IEEE Trans. Inf. Forensics Secur. 19, 4752\u20134766 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Qin, Z.,\u00a0Yao, L.,\u00a0Chen, D.,\u00a0Li, Y.,\u00a0Ding, B.,\u00a0Cheng, M.: Revisiting personalized federated learning: Robustness against backdoor attacks. In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp.\u00a04743\u20134755 (2023)","DOI":"10.1145\/3580305.3599898"},{"key":"10_CR11","first-page":"15434","volume":"34","author":"O Marfoq","year":"2021","unstructured":"Marfoq, O., Neglia, G., Bellet, A., Kameni, L., Vidal, R.: Federated multi-task learning under a mixture of distributions. Adv. Neural. Inf. Process. Syst. 34, 15434\u201315447 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10_CR12","first-page":"21394","volume":"33","author":"CT Dinh","year":"2020","unstructured":"Dinh, C.T., Tran, N., Nguyen, J.: Personalized federated learning with moreau envelopes. Adv. Neural. Inf. Process. Syst. 33, 21394\u201321405 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107166","volume":"127","author":"TD Nguyen","year":"2024","unstructured":"Nguyen, T.D., Nguyen, T., Nguyen, P., Pham, H.H., Doan, K.D., Wong, K.-S.: Backdoor attacks and defenses in federated learning: survey, challenges and future research directions. Eng. Appl. Artif. Intell. 127, 107166 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10_CR14","unstructured":"Li, S.,\u00a0Dai, Y.: $$\\{$$BackdoorIndicator$$\\}$$: Leveraging $$\\{$$OOD$$\\}$$ data for proactive backdoor detection in federated learning. In: 33rd USENIX Security Symposium (USENIX Security 24), pp.\u00a04193\u20134210 (2024)"},{"key":"10_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103557","volume":"136","author":"Z Ma","year":"2024","unstructured":"Ma, Z., Gao, T.: Federated learning backdoor attack detection with persistence diagram. Comput. Secur. 136, 103557 (2024)","journal-title":"Comput. Secur."},{"key":"10_CR16","unstructured":"Zhang, K., et al.: FLIP: a provable defense framework for backdoor mitigation in federated learning. In: The Eleventh International Conference on Learning Representations, ICLR 2023, Kigali, Rwanda, 1\u20135 May 2023. OpenReview.net (2023)"},{"key":"10_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.107016","volume":"184","author":"Z Tan","year":"2025","unstructured":"Tan, Z., Cai, J., Lian, P., Liu, X., Che, Y., et al.: Fedpd: defending federated prototype learning against backdoor attacks. Neural Netw. 184, 107016 (2025)","journal-title":"Neural Netw."},{"key":"10_CR18","unstructured":"Goodfellow, I.J.,\u00a0Shlens, J.,\u00a0Szegedy, C.: Explaining and harnessing adversarial examples. In:\u00a0Bengio, Y.,\u00a0LeCun, Y. (eds.) 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, 7\u20139 May 2015, Conference Track Proceedings (2015)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Mu, B., et al.: Progressive backdoor erasing via connecting backdoor and adversarial attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp.\u00a020495\u201320503 (2023)","DOI":"10.1109\/CVPR52729.2023.01963"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Yin, J.-L., Wang, W., Lin, W., Liu, X., et al.: Adversarial-inspired backdoor defense via bridging backdoor and adversarial attacks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 39, pp. 9508\u20139516 (2025)","DOI":"10.1609\/aaai.v39i9.33030"},{"key":"10_CR21","unstructured":"Madry, A.,\u00a0Makelov, A.,\u00a0Schmidt, L.,\u00a0Tsipras, D.,\u00a0Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, 30 April\u20133 May 2018, Conference Track Proceedings. OpenReview.net (2018)"},{"key":"10_CR22","unstructured":"Yin, D.,\u00a0Chen, Y.,\u00a0Kannan, R.,\u00a0Bartlett, P.: Byzantine-robust distributed learning: Towards optimal statistical rates. In: International Conference on Machine Learning, pp.\u00a05650\u20135659. PMLR (2018)"},{"key":"10_CR23","unstructured":"Guerraoui, R.,\u00a0Rouault, S., et\u00a0al.: The hidden vulnerability of distributed learning in byzantium. In: International Conference on Machine Learning, pp.\u00a03521\u20133530. PMLR (2018)"},{"key":"10_CR24","first-page":"1","volume":"30","author":"P Blanchard","year":"2017","unstructured":"Blanchard, P., Mhamdi, E.M., Guerraoui, R., Stainer, J.: Machine learning with adversaries: byzantine tolerant gradient descent. Adv. Neural Inf. Process. Syst. 30, 1\u201311 (2017)","journal-title":"Adv. Neural Inf. Process. Syst."}],"updated-by":[{"DOI":"10.1007\/978-981-95-2961-2_31","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000}}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2961-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:48:12Z","timestamp":1772196492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2961-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,10]]},"ISBN":["9789819529605","9789819529612"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2961-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,10]]},"assertion":[{"value":"10 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"10 October 2025","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"A correction has been published.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yokohama","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/provsec2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}