{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:24:29Z","timestamp":1770229469055,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819698714","type":"print"},{"value":"9789819698721","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9872-1_19","type":"book-chapter","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T14:34:30Z","timestamp":1753281270000},"page":"227-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Stealthy Backdoors in Vertical Federated Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0587-5637","authenticated-orcid":false,"given":"Xu","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0720-4925","authenticated-orcid":false,"given":"Yuchuan","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7275-8190","authenticated-orcid":false,"given":"Shaojing","family":"Fu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9332-5258","authenticated-orcid":false,"given":"Ming","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,24]]},"reference":[{"issue":"12","key":"19_CR1","first-page":"1","volume":"56","author":"J Chen","year":"2024","unstructured":"Chen, J., Yan, H., Liu, Z., et al.: When federated learning meets privacy-preserving computation. ACM Comput. Surv. 56(12), 1\u201336 (2024)","journal-title":"ACM Comput. Surv."},{"issue":"7","key":"19_CR2","doi-asserted-by":"publisher","first-page":"3615","DOI":"10.1109\/TKDE.2024.3352628","volume":"36","author":"Y Liu","year":"2024","unstructured":"Liu, Y., Kang, Y., Zou, T., et al.: Vertical federated learning: concepts, advances, and challenges. IEEE Trans. Knowl. Data Eng. 36(7), 3615\u20133634 (2024)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Khan, A., ten Thij, M., Wilbik, A.: Vertical federated learning: a structured literature review. Knowl. Inf. Syst., 1\u201339 (2025)","DOI":"10.1109\/IJCNN64981.2025.11227719"},{"issue":"1","key":"19_CR4","doi-asserted-by":"publisher","first-page":"2608","DOI":"10.1109\/TCE.2023.3315415","volume":"70","author":"M Guduri","year":"2023","unstructured":"Guduri, M., Chakraborty, C., Maheswari, U., et al.: Blockchain-based federated learning technique for privacy preservation and security of smart electronic health records. IEEE Trans. Consum. Electron. 70(1), 2608\u20132617 (2023)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Mehta, S., Aneja, A.: securing data privacy in machine learning: the FedAvg of federated learning approach. In: Proceedings of the 2024 4th Asian Conference on Innovation in Technology, pp. 1\u20135 (2024)","DOI":"10.1109\/ASIANCON62057.2024.10838085"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Ramu, S.P., Boopalan, P.: Federated learning enabled digital twins for smart cities: concepts, recent advances, and future directions. Sustain. Cities Soc. 79 (2022)","DOI":"10.1016\/j.scs.2021.103663"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Chen, C., Zhou, J., Wang, L. et al.: When homomorphic encryption marries secret sharing: secure large-scale sparse logistic regression and applications in risk control. In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 2652\u20132662 (2021)","DOI":"10.1145\/3447548.3467210"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Naseri, M., Han, Y., De Cristofaro, E.: BadVFL: backdoor attacks in vertical federated learning. In: Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), pp. 2013\u20132028 (2024)","DOI":"10.1109\/SP54263.2024.00008"},{"key":"19_CR9","unstructured":"Fu, C., Zhang, X., Ji, S., et al.: Label inference attacks against vertical federated learning. In: Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), pp. 1397\u20131414 (2022)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., et al.: Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 506\u2013519 (2017)","DOI":"10.1145\/3052973.3053009"},{"key":"19_CR11","unstructured":"Krizhevsky, A., Hinton, G.: Learning multiple layers of features from tiny images (2009)"},{"key":"19_CR12","unstructured":"Darlow, L.N., Crowley, E.J., Antoniou, A., Storkey, A.J.: CINIC-10 is Not ImageNet or CIFAR-10 (2018)"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9872-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T06:23:40Z","timestamp":1770186220000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9872-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819698714","9789819698721"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9872-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}