{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T09:19:19Z","timestamp":1767863959816,"version":"3.49.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T00:00:00Z","timestamp":1737417600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T00:00:00Z","timestamp":1737417600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Central Government Guides Local Science and Technology Development Special Funds","award":["[2018]4008"],"award-info":[{"award-number":["[2018]4008"]}]},{"name":"the Science and Technology Planned Project of Guizhou Province","award":["[2023]YB449"],"award-info":[{"award-number":["[2023]YB449"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10586-024-04837-1","type":"journal-article","created":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T06:27:30Z","timestamp":1737440850000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Sample-independent federated learning backdoor attack in speaker recognition"],"prefix":"10.1007","volume":"28","author":[{"given":"Weida","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Sicong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,21]]},"reference":[{"key":"4837_CR1","doi-asserted-by":"crossref","unstructured":"Liu, A.H., Hsu, W.-N., Auli, M., Baevski, A.: Towards end-to-end unsupervised speech recognition. In: 2022 IEEE Spoken Language Technology Workshop (SLT). pp. 221\u2013228 (2023)","DOI":"10.1109\/SLT54892.2023.10023187"},{"key":"4837_CR2","unstructured":"Radford, A., Kim, J.W., Xu, T., Brockman, G., Mcleavey, C., Sutskever, I.: Robust speech recognition via large-scale weak supervision. In: International Conference on Machine Learning. pp. 28492\u201328518. PMLR (2023)"},{"key":"4837_CR3","unstructured":"Convolutional Neural Networks for Speech Recognition | IEEE Journals & Magazine | IEEE Xplore, https:\/\/ieeexplore.ieee.org\/abstract\/document\/6857341"},{"key":"4837_CR4","unstructured":"Li, C., Ma, X., Jiang, B., Li, X., Zhang, X., Liu, X., Cao, Y., Kannan, A., Zhu, Z.: Deep speaker: an end-to-end neural speaker embedding system. Preprint at http:\/\/arxiv.org\/abs\/1705.02304 (2017)"},{"key":"4837_CR5","doi-asserted-by":"crossref","unstructured":"Ravanelli, M., Bengio, Y.: Speaker recognition from raw waveform with SincNet. In: 2018 IEEE Spoken Language Technology Workshop (SLT). pp. 1021\u20131028 (2018)","DOI":"10.1109\/SLT.2018.8639585"},{"key":"4837_CR6","doi-asserted-by":"crossref","unstructured":"Snyder, D., Garcia-Romero, D., Sell, G., Povey, D., Khudanpur, S.: X-Vectors: robust DNN embeddings for speaker recognition. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp. 5329\u20135333 (2018)","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"4837_CR7","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A. y: Communication-efficient learning of deep networks from decentralized data. In: Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. pp. 1273\u20131282. PMLR (2017)"},{"key":"4837_CR8","doi-asserted-by":"crossref","unstructured":"Xiao, H., Xiao, H., Eckert, C.: Adversarial label flips attack on support vector machines. In: ECAI 2012. pp. 870\u2013875. IOS Press (2012)","DOI":"10.3233\/978-1-61499-098-7-870"},{"key":"4837_CR9","unstructured":"Shafahi, A., Huang, W.R., Najibi, M., Suciu, O., Studer, C., Dumitras, T., Goldstein, T.: Poison frogs! targeted clean-label poisoning attacks on neural networks. In: Advances in Neural Information Processing Systems. Curran Associates, Inc. (2018)"},{"key":"4837_CR10","unstructured":"Gu, T., Dolan-Gavitt, B., Garg, S.: BadNets: identifying vulnerabilities in the machine learning model supply chain, Preprint at http:\/\/arxiv.org\/abs\/1708.06733 (2019)"},{"key":"4837_CR11","doi-asserted-by":"crossref","unstructured":"Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. In: 2019 IEEE Symposium on Security and Privacy (SP). pp. 739\u2013753 (2019)","DOI":"10.1109\/SP.2019.00065"},{"key":"4837_CR12","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-031-01585-4_4","volume-title":"Federated Learning","author":"Q Yang","year":"2020","unstructured":"Yang, Q., Liu, Y., Cheng, Y., Kang, Y., Chen, T., Yu, H.: Horizontal Federated Learning. In: Yang, Q., Liu, Y., Cheng, Y., Kang, Y., Chen, T., Yu, H. (eds.) Federated Learning, pp. 49\u201367. Springer International Publishing, Cham (2020)"},{"key":"4837_CR13","doi-asserted-by":"publisher","first-page":"3615","DOI":"10.1109\/TKDE.2024.3352628","volume":"36","author":"Y Liu","year":"2024","unstructured":"Liu, Y., Kang, Y., Zou, T., Pu, Y., He, Y., Ye, X., Ouyang, Y., Zhang, Y.-Q., Yang, Q.: Vertical federated learning: concepts, advances, and challenges. IEEE Trans. Knowl. Data Eng. 36, 3615\u20133634 (2024). https:\/\/doi.org\/10.1109\/TKDE.2024.3352628","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"4837_CR14","doi-asserted-by":"publisher","first-page":"35","DOI":"10.3233\/IA-200075","volume":"15","author":"S Saha","year":"2021","unstructured":"Saha, S., Ahmad, T.: Federated transfer learning: concept and applications. Intell. Artif. 15, 35\u201344 (2021). https:\/\/doi.org\/10.3233\/IA-200075","journal-title":"Intell. Artif."},{"key":"4837_CR15","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1109\/TCCN.2021.3084406","volume":"7","author":"H Wu","year":"2021","unstructured":"Wu, H., Wang, P.: Fast-convergent federated learning with adaptive weighting. IEEE Trans. Cognitive Commun. Netw. 7, 1078\u20131088 (2021). https:\/\/doi.org\/10.1109\/TCCN.2021.3084406","journal-title":"IEEE Trans. Cognitive Commun. Netw."},{"key":"4837_CR16","unstructured":"Li, X., Huang, K., Yang, W., Wang, S., Zhang, Z.: On the convergence of FedAvg on non-IID data, Preprint at http:\/\/arxiv.org\/abs\/1907.02189 (2020)"},{"key":"4837_CR17","doi-asserted-by":"crossref","unstructured":"Kong, Y., Zhang, J.: Adversarial Audio: a new information hiding method and backdoor for DNN-based speech recognition models, Preprint at http:\/\/arxiv.org\/abs\/1904.03829 (2019)","DOI":"10.21437\/Interspeech.2020-1294"},{"key":"4837_CR18","unstructured":"Zhai, T., Li, Y., Zhang, Z., Wu, B., Jiang, Y., Xia, S.-T.: Backdoor Attack against Speaker Verification, Preprint at http:\/\/arxiv.org\/abs\/2010.11607 (2021)"},{"key":"4837_CR19","doi-asserted-by":"crossref","unstructured":"Shi, C., Zhang, T., Li, Z., Phan, H., Zhao, T., Wang, Y., Liu, J., Yuan, B., Chen, Y.: Audio-domain position-independent backdoor attack via unnoticeable triggers. In: Proceedings of the 28th Annual International Conference on Mobile Computing And Networking. pp. 583\u2013595. Association for Computing Machinery, New York (2022)","DOI":"10.1145\/3495243.3560531"},{"key":"4837_CR20","doi-asserted-by":"publisher","first-page":"5786","DOI":"10.3390\/app12125786","volume":"12","author":"J Ye","year":"2022","unstructured":"Ye, J., Liu, X., You, Z., Li, G., Liu, B.: DriNet: Dynamic backdoor attack against automatic speech recognization models. Appl. Sci. 12, 5786 (2022). https:\/\/doi.org\/10.3390\/app12125786","journal-title":"Appl. Sci."},{"key":"4837_CR21","doi-asserted-by":"publisher","first-page":"5691","DOI":"10.1109\/TIP.2022.3201472","volume":"31","author":"J Zhang","year":"2022","unstructured":"Zhang, J., Dongdong, C., Huang, Q., Liao, J., Zhang, W., Feng, H., Hua, G., Yu, N.: Poison ink: robust and invisible backdoor attack. IEEE Trans. Image Process. 31, 5691\u20135705 (2022). https:\/\/doi.org\/10.1109\/TIP.2022.3201472","journal-title":"IEEE Trans. Image Process."},{"key":"4837_CR22","unstructured":"Chen, X., Liu, C., Li, B., Lu, K., Song, D.: Targeted backdoor attacks on deep learning systems using data poisoning, Preprint at http:\/\/arxiv.org\/abs\/1712.05526 (2017)"},{"key":"4837_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3021407","author":"S Li","year":"2020","unstructured":"Li, S., Xue, M., Zhao, B., Zhu, H., Zhang, X.: Invisible backdoor attacks on deep neural networks via steganography and regularization. IEEE Trans. Dependable Secur. Comput. (2020). https:\/\/doi.org\/10.1109\/TDSC.2020.3021407","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"4837_CR24","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-030-58607-2_11","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Ma, X., Bailey, J., Lu, F.: Reflection backdoor: a natural backdoor attack on deep neural networks. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) Computer Vision \u2013 ECCV 2020, pp. 182\u2013199. Springer, Cham (2020)"},{"key":"4837_CR25","unstructured":"Xie, C., Huang, K., Chen, P.-Y., Li, B.: DBA: distributed backdoor attacks against federated learning. Presented at the International Conference on Learning Representations February 10 (2022)"},{"key":"4837_CR26","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-CAM: visual explanations from deep networks via gradient-based localization. Presented at the Proceedings of the IEEE International Conference on Computer Vision (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"4837_CR27","unstructured":"Zhang, Z., Panda, A., Song, L., Yang, Y., Mahoney, M.W., Gonzalez, J.E., Ramchandran, K., Mittal, P.: Neurotoxin: durable backdoors in federated learning, Preprint at http:\/\/arxiv.org\/abs\/2206.10341 (2022)"},{"key":"4837_CR28","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/2938386","author":"H Kwon","year":"2021","unstructured":"Kwon, H., Lee, S.: Textual backdoor attack for the text classification system. Secur. Commun. Netw. (2021). https:\/\/doi.org\/10.1155\/2021\/2938386","journal-title":"Secur. Commun. Netw."},{"key":"4837_CR29","doi-asserted-by":"crossref","unstructured":"Du, W., Yuan, T., Zhao, H., Liu, G.: NWS: Natural textual backdoor attacks via word substitution. In: ICASSP 2024\u20142024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp. 4680\u20134684 (2024)","DOI":"10.1109\/ICASSP48485.2024.10447968"},{"key":"4837_CR30","unstructured":"Pan, X., Zhang, M., Sheng, B., Zhu, J., Yang, M.: Hidden trigger backdoor attack on {NLP} models via linguistic style manipulation. Presented at the 31st USENIX Security Symposium (USENIX Security 22) (2022)"},{"key":"4837_CR31","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/TR.2022.3159784","volume":"71","author":"S Udeshi","year":"2022","unstructured":"Udeshi, S., Peng, S., Woo, G., Loh, L., Rawshan, L., Chattopadhyay, S.: Model agnostic defence against backdoor attacks in machine learning. IEEE Trans. Reliab. 71, 880\u2013895 (2022). https:\/\/doi.org\/10.1109\/TR.2022.3159784","journal-title":"IEEE Trans. Reliab."},{"key":"4837_CR32","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-031-10684-2_3","volume-title":"Data and Applications Security and Privacy XXXVI","author":"A Milakovic","year":"2022","unstructured":"Milakovic, A., Mayer, R.: Combining defences against data-poisoning based backdoor attacks on neural networks. In: Sural, S., Lu, H. (eds.) Data and Applications Security and Privacy XXXVI, pp. 28\u201347. Springer, Cham (2022)"},{"key":"4837_CR33","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.neucom.2021.04.105","volume":"452","author":"C Chen","year":"2021","unstructured":"Chen, C., Dai, J.: Mitigating backdoor attacks in LSTM-based text classification systems by backdoor keyword identification. Neurocomputing 452, 253\u2013262 (2021). https:\/\/doi.org\/10.1016\/j.neucom.2021.04.105","journal-title":"Neurocomputing"},{"key":"4837_CR34","unstructured":"Salem, A., Backes, M., Zhang, Y.: Don\u2019t Trigger Me! A Triggerless backdoor attack against deep neural networks, Preprint at http:\/\/arxiv.org\/abs\/2010.03282 (2020)"},{"key":"4837_CR35","doi-asserted-by":"crossref","unstructured":"Garofolo, J.S., Lamel, L.F., Fisher, W.M., Fiscus, J.G., Pallett, D.S.: DARPA TIMIT acoustic-phonetic continous speech corpus CD-ROM. NIST speech disc 1-1.1. NASA STI\/Recon Technical Report N. 93, 27403 (1993)","DOI":"10.6028\/NIST.IR.4930"},{"key":"4837_CR36","doi-asserted-by":"crossref","unstructured":"Chung, J.S., Nagrani, A., Zisserman, A.: VoxCeleb2: deep speaker recognition. In: Interspeech 2018. pp. 1086\u20131090 (2018)","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"4837_CR37","doi-asserted-by":"crossref","unstructured":"Panayotov, V., Chen, G., Povey, D., Khudanpur, S.: Librispeech: An ASR corpus based on public domain audio books. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp. 5206\u20135210 (2015)","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"4837_CR38","unstructured":"Becker, S., Vielhaben, J., Ackermann, M., M\u00fcller, K.-R., Lapuschkin, S., Samek, W.: AudioMNIST: exploring explainable artificial intelligence for audio analysis on a simple benchmark, Preprint at http:\/\/arxiv.org\/abs\/1807.03418 (2023)"},{"key":"4837_CR39","doi-asserted-by":"crossref","unstructured":"Deng, J., Chen, Y., Xu, W.: FenceSitter: Black-box, content-agnostic, and synchronization-free enrollment-phase attacks on speaker recognition systems. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. pp. 755\u2013767. Association for Computing Machinery, New York (2022)","DOI":"10.1145\/3548606.3559357"},{"key":"4837_CR40","doi-asserted-by":"crossref","unstructured":"Koffas, S., Pajola, L., Picek, S., Conti, M.: Going in style: audio backdoors through stylistic transformations. In: ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp. 1\u20135 (2023)","DOI":"10.1109\/ICASSP49357.2023.10096332"},{"key":"4837_CR41","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1109\/LSP.2023.3293429","volume":"30","author":"Z Ye","year":"2023","unstructured":"Ye, Z., Yan, D., Dong, L., Deng, J., Yu, S.: Stealthy backdoor attack against speaker recognition using phase-injection hidden trigger. IEEE Signal Process. Lett. 30, 1057\u20131061 (2023). https:\/\/doi.org\/10.1109\/LSP.2023.3293429","journal-title":"IEEE Signal Process. Lett."},{"key":"4837_CR42","doi-asserted-by":"crossref","unstructured":"Ye, Z., Yan, D., Dong, L., Shen, K.: Breaking speaker recognition with paddingback. In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp. 4435\u20134439 (2024)","DOI":"10.1109\/ICASSP48485.2024.10448169"},{"key":"4837_CR43","doi-asserted-by":"crossref","unstructured":"Ning, R., Xin, C., Wu, H.: Trojanflow: A neural backdoor attack to deep learning-based network traffic classifiers. IEEE INFOCOM 2022-IEEE Conference on Computer Communications IEEE. pp. 1429\u20131438 (2022)","DOI":"10.1109\/INFOCOM48880.2022.9796878"},{"key":"4837_CR44","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., Li, J., Ding, M., Ma, C., Yang, H.H., Farokhi, F., Jin, S., Quek, T.Q.S., Poor, H.V.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454\u20133469 (2020). https:\/\/doi.org\/10.1109\/TIFS.2020.2988575","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4837_CR45","unstructured":"Li, Z., Lin, T., Shang, X., Wu, C.: Revisiting weighted aggregation in federated learning with neural networks. In: International Conference on Machine Learning. pp. 19767\u201319788. PMLR (2023)"},{"key":"4837_CR46","unstructured":"Blanchard, P., Mhamdi, E.M.E., Guerraoui, R., Stainer, J.: Byzantine-tolerant machine learning, Preprint at http:\/\/arxiv.org\/abs\/1703.02757 (2017)"},{"key":"4837_CR47","unstructured":"Blanchard, P., El Mhamdi, E.M., Guerraoui, R., Stainer, J.: Machine learning with adversaries: byzantine tolerant gradient descent. In: Advances in Neural Information Processing Systems. Curran Associates, Inc. (2017)"},{"key":"4837_CR48","unstructured":"Yin, D., Chen, Y., Kannan, R., Bartlett, P.: Byzantine-robust distributed learning: towards optimal statistical rates. In: Proceedings of the 35th International Conference on Machine Learning. pp. 5650\u20135659. PMLR (2018)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04837-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04837-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04837-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T21:52:14Z","timestamp":1747777934000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04837-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,21]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["4837"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04837-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,21]]},"assertion":[{"value":"24 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"158"}}