{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:24:10Z","timestamp":1766269450773,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819611478"},{"type":"electronic","value":"9789819611485"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1148-5_4","type":"book-chapter","created":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T13:45:21Z","timestamp":1737121521000},"page":"35-43","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["F2L: A Lightweight Focus Layer Against Backdoor Attack in\u00a0Federated Learning"],"prefix":"10.1007","author":[{"given":"Peiyao","family":"Niu","sequence":"first","affiliation":[]},{"given":"Lumin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Peilin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,18]]},"reference":[{"key":"4_CR1","unstructured":"McMahan B., Moore E., Ramage D., Hampson S., Aguera y Arcas B.: Communication-efficient learning of deep networks from decentralized data. In: Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017, PMLR, Online, vol. 54, pp. 1273\u20131282"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Li L., Yuxi F., Kuoyi L.: A Survey on Federated Learning. In: IEEE 16th International Conference on Control & Automation, ICCA 2020, Singapore, pp. 791\u2013796 (2020)","DOI":"10.1109\/ICCA51439.2020.9264412"},{"key":"4_CR3","unstructured":"Lingjuan L., Han Y., Qiang Y.: Threats to Federated Learning: A Survey. ArXiv, vol. abs\/2003.02133 (2020)"},{"key":"4_CR4","unstructured":"Priyanka Mary M.: Federated Learning: Opportunities and Challenges. ArXiv, vol. abs\/2101.05428 (2021)"},{"key":"4_CR5","unstructured":"Bagdasaryan, E.; Veit, A.; Hua, Y.; Estrin, D.; Shmatikov, V.: How to backdoor federated learning. In: Proceedings of the 2020 International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, PMLR, Online, vol. 108, pp. 2938\u20132948"},{"key":"4_CR6","unstructured":"Thuy Dung N., Tuan A. N., Anh T., Khoa D.D., Kok-Seng W.: IBA: towards irreversible backdoor attacks in federated learning. In: Proceedings of the 37th International Conference on Neural Information Processing Systems, NeurIPS 2023, Curran Associates, Inc, 2023, vol. 36, pp. 66364\u201366376"},{"key":"4_CR7","unstructured":"Blanchard P., El Mhamdi E. M., Guerraoui R., Stainer J.: Proceedings of the 31st International Conference on Neural Information Processing Systems, NeurIPS 2017, Curran Associates, Inc, vol. 11, pp. 118\u2013128 (2017)"},{"key":"4_CR8","unstructured":"Ziteng S., Peter K., Ananda Theertha S.: Can You Really Backdoor Federated Learning? ArXiv, vol. abs\/1911.07963 (2019)"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. In: Foundations and Trends in Theoretical Computer Science (2014). https:\/\/doi.org\/10.1561\/0400000042","DOI":"10.1561\/0400000042"},{"key":"4_CR10","unstructured":"Luis M., Kenneth T.C.o., Emil C.L.: Byzantine-Robust Federated Machine Learning through Adaptive Model Averaging. ArXiv, vol. abs\/1909.05125 (2019)"},{"key":"4_CR11","unstructured":"El Mahdi El M., Rachid ., S\u00e9bastien R.: Proceedings of the 35th International Conference on Machine Learning, ICML 2018, PMLR, Online, vol. 80, pp. 3521\u20133530"},{"key":"4_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3418862","author":"H Wenke","year":"2024","unstructured":"Wenke, H., Mang, Y., et al.: Federated learning for generalization, robustness, fairness: a survey and benchmark. IEEE Trans. Pattern Anal. Mach. Intell. (2024). https:\/\/doi.org\/10.1109\/TPAMI.2024.3418862","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Liu, T., Zhang, Y., Feng, Z., Yang, Z., Xu, C., Man, D., Yang, W.: Beyond traditional threats: a persistent backdoor attack on federated learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, AAAI, vol. 38, pp. 21359\u201321367 (2024)","DOI":"10.1609\/aaai.v38i19.30131"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"1142","DOI":"10.1109\/TSP.2022.3153135","volume":"70","author":"K Pillutla","year":"2022","unstructured":"Pillutla, K., Kakade, S.M., Harchaoui, Z.: Robust aggregation for federated learning. IEEE Trans. Signal Process. 70, 1142\u20131154 (2022). https:\/\/doi.org\/10.1109\/TSP.2022.3153135","journal-title":"IEEE Trans. Signal Process."},{"key":"4_CR15","unstructured":"Thien Duc N., Phillip R, et al.: FLAME: taming backdoors in federated learning. In: 31st USENIX Security Symposium, USENIX Security 2022, pp. 1415\u20131432"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1148-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T13:45:29Z","timestamp":1737121529000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1148-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819611478","9789819611485"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1148-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"18 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIS&P","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ais&p2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}