{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:08:37Z","timestamp":1757617717938,"version":"3.44.0"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819645657"},{"type":"electronic","value":"9789819645664"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-4566-4_23","type":"book-chapter","created":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T00:03:21Z","timestamp":1743552201000},"page":"332-346","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["GAN-Based Adaptive Trigger Generation and Target Gradient Alignment in Vertical Federated Learning Backdoor Attacks"],"prefix":"10.1007","author":[{"given":"Kun","family":"Li","sequence":"first","affiliation":[]},{"given":"Hongyang","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Jiatong","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Dongyang","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"key":"23_CR1","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273\u20131282. PMLR (2017)"},{"issue":"6","key":"23_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MIS.2021.3082561","volume":"36","author":"K Cheng","year":"2021","unstructured":"Cheng, K., et al.: Secureboost: a lossless federated learning framework. IEEE Intell. Syst. 36(6), 87\u201398 (2021)","journal-title":"IEEE Intell. Syst."},{"key":"23_CR3","first-page":"14068","volume":"33","author":"C He","year":"2020","unstructured":"He, C., Annavaram, M., Avestimehr, S.: Group knowledge transfer: federated learning of large cnns at the edge. Adv. Neural. Inf. Process. Syst. 33, 14068\u201314080 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Hu, Y., Niu, D., Yang, J., Zhou, S.: Fdml: a collaborative machine learning framework for distributed features. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2232\u20132240 (2019)","DOI":"10.1145\/3292500.3330765"},{"key":"23_CR5","unstructured":"Yang, L., Tianjian, C., Qiang, Y.: Secure federated transfer learning. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2018)"},{"key":"23_CR6","unstructured":"Liu, Y., et al.: A communication efficient collaborative learning framework for distributed features. arXiv preprint arXiv:1912.11187 (2019)"},{"issue":"2","key":"23_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) 10(2), 1\u201319 (2019)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"23_CR8","unstructured":"Kairouz, P., et\u00a0al.: Advances and open problems in federated learning. Found. Trends\u00ae Mach. Learn. 14(1\u20132), 1\u2013210 (2021)"},{"issue":"1","key":"23_CR9","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1108\/CMS-06-2017-0148","volume":"12","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Chen, X., Liu, X., Zhu, N.: Exploring trust transfer between internet enterprises and their affiliated internet-only banks: an adoption study of internet-only banks in china. Chin. Manag. Stud. 12(1), 56\u201378 (2018)","journal-title":"Chin. Manag. Stud."},{"key":"23_CR10","doi-asserted-by":"publisher","DOI":"10.2196\/42621","volume":"25","author":"J Matschinske","year":"2023","unstructured":"Matschinske, J., et al.: The featurecloud platform for federated learning in biomedicine: unified approach. J. Med. Internet Res. 25, e42621 (2023)","journal-title":"J. Med. Internet Res."},{"issue":"6","key":"23_CR11","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1038\/s42256-020-0186-1","volume":"2","author":"GA Kaissis","year":"2020","unstructured":"Kaissis, G.A., Makowski, M.R., R\u00fcckert, D., Braren, R.F.: Secure, privacy-preserving and federated machine learning in medical imaging. Nat. Mach. Intell. 2(6), 305\u2013311 (2020)","journal-title":"Nat. Mach. Intell."},{"key":"23_CR12","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V.: How to backdoor federated learning. In: International Conference on Artificial Intelligence and Statistics, pp. 2938\u20132948. PMLR (2020)"},{"key":"23_CR13","unstructured":"Baruch, G., Baruch, M., Goldberg, Y.: A little is enough: circumventing defenses for distributed learning. Adv. Neural Inf. Process. Syst. 32 (2019)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Shejwalkar, V., Houmansadr, A.: Manipulating the byzantine: optimizing model poisoning attacks and defenses for federated learning. In: NDSS (2021)","DOI":"10.14722\/ndss.2021.24498"},{"key":"23_CR15","unstructured":"Zou, T., et al.: Defending batch-level label inference and replacement attacks in vertical federated learning. IEEE Trans. Big Data (2022)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Naseri, M., Han, Y., De\u00a0Cristofaro, E.: Badvfl: backdoor attacks in vertical federated learning. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 2013\u20132028. IEEE (2024)","DOI":"10.1109\/SP54263.2024.00008"},{"key":"23_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103193","volume":"129","author":"Y Gu","year":"2023","unstructured":"Gu, Y., Bai, Y.: LR-BA: backdoor attack against vertical federated learning using local latent representations. Comput. Secur. 129, 103193 (2023)","journal-title":"Comput. Secur."},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Chen, P., Yang, J., Lin, J., Lu, Z., Duan, Q., Chai, H.: A practical clean-label backdoor attack with limited information in vertical federated learning. In: 2023 IEEE International Conference on Data Mining (ICDM), pp. 41\u201350. IEEE (2023)","DOI":"10.1109\/ICDM58522.2023.00013"},{"key":"23_CR19","first-page":"3454","volume":"33","author":"TA Nguyen","year":"2020","unstructured":"Nguyen, T.A., Tran, A.: Input-aware dynamic backdoor attack. Adv. Neural. Inf. Process. Syst. 33, 3454\u20133464 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Xuan, Y., Chen, X., Zhao, Z., Tang, B., Dong, Y.: Practical and general backdoor attacks against vertical federated learning. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 402\u2013417. Springer (2023)","DOI":"10.1007\/978-3-031-43415-0_24"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"He, Y., et al.: Backdoor attack against split neural network-based vertical federated learning. IEEE Trans. Inf. Forensics Secur. (2023)","DOI":"10.1109\/TIFS.2023.3327853"},{"key":"23_CR22","first-page":"26645","volume":"35","author":"J Liu","year":"2022","unstructured":"Liu, J., Xie, C., Koyejo, S., Li, B.: Copur: certifiably robust collaborative inference via feature purification. Adv. Neural. Inf. Process. Syst. 35, 26645\u201326657 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Salem, A., Wen, R., Backes, M., Ma, S., Zhang, Y.: Dynamic backdoor attacks against machine learning models. In: 2022 IEEE 7th European Symposium on Security and Privacy (EuroS &P), pp. 703\u2013718. IEEE (2022)","DOI":"10.1109\/EuroSP53844.2022.00049"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Li, Y., Li, Y., Wu, B., Li, L., He, R., Lyu, S.: Invisible backdoor attack with sample-specific triggers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 16463\u201316472 (2021)","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"23_CR25","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images (2009)"},{"key":"23_CR26","unstructured":"Darlow, L.N., Crowley, E.J., Antoniou, A., Storkey, A.J.: Cinic-10 is not imagenet or cifar-10. arXiv preprint arXiv:1810.03505 (2018)"},{"key":"23_CR27","unstructured":"Fu, C., et al.: Label inference attacks against vertical federated learning. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 1397\u20131414 (2022)"},{"issue":"1","key":"23_CR28","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TNNLS.2022.3182979","volume":"35","author":"Y Li","year":"2022","unstructured":"Li, Y., Jiang, Y., Li, Z., Xia, S.T.: Backdoor learning: a survey. IEEE Trans. Neural Netw. Learn. Syst. 35(1), 5\u201322 (2022)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-4566-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T08:32:08Z","timestamp":1757147528000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-4566-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819645657","9789819645664"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-4566-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/ml4cs2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}