{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:06:04Z","timestamp":1777889164944,"version":"3.51.4"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472284,62302288"],"award-info":[{"award-number":["62472284,62302288"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,19]]},"DOI":"10.1109\/iccv51701.2025.02708","type":"proceedings-article","created":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T19:45:49Z","timestamp":1777491949000},"page":"29163-29172","source":"Crossref","is-referenced-by-count":0,"title":["Stealthy Backdoor Attack in Federated Learning via Adaptive Layer-Wise Gradient Alignment"],"prefix":"10.1109","author":[{"given":"Qingqian","family":"Yang","sequence":"first","affiliation":[{"name":"Shanghai University of Electric Power"}]},{"given":"Peishen","family":"Yan","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Xiaoyu","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Jiaru","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Tao","family":"Song","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Yang","family":"Hua","sequence":"additional","affiliation":[{"name":"Queen&#x0027;s University Belfast"}]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology"}]},{"given":"Liangliang","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai University of Electric Power"}]},{"given":"Haibing","family":"Guan","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_22"},{"key":"ref2","article-title":"How To Backdoor Federated Learning","volume-title":"AISTATS","author":"Bagdasaryan","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.892"},{"key":"ref4","article-title":"Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent","volume-title":"NeurIPS","author":"Blanchard","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.11929"},{"key":"ref7","first-page":"4","article-title":"Local Model Poisoning Attacks to Byzantine-Robust Federated Learning","volume-title":"USENIX Security","author":"Fang","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i10.26393"},{"key":"ref9","first-page":"2","article-title":"The Limitations of Federated Learning in Sybil Settings","volume-title":"RAID","author":"Fung","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00429"},{"key":"ref13","first-page":"3","article-title":"Lockdown: Backdoor Defense for Federated Learning with Isolated Subspace Training","volume-title":"NeurIPS","author":"Huang","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511989"},{"key":"ref16","first-page":"2","article-title":"Federated learning: Strategies for improving communication efficiency","author":"Kone\u010dn\u1ef3","year":"2016","journal-title":"arXiv preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623212"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179401"},{"key":"ref19","first-page":"2","article-title":"Infighting in the dark: Multi-labels backdoor attack in federated learning","author":"Li","year":"2024","journal-title":"arXiv preprint"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i7.26083"},{"key":"ref21","first-page":"1","article-title":"CommunicationEfficient Learning of Deep Networks from Decentralized Data","volume-title":"AISTATS","author":"McMahan","year":"2017"},{"key":"ref22","first-page":"2","article-title":"The Hidden Vulnerability of Distributed Learning in Byzantium","volume-title":"ICML","author":"Mahdi","year":"2018"},{"key":"ref23","article-title":"FLAME: Taming Backdoors in Federated Learning","volume-title":"USENIX Security","volume":"22","author":"Duc Nguyen","year":"2022"},{"key":"ref24","article-title":"IBA: Towards Irreversible Backdoor Attacks in Federated Learning","volume-title":"NeurIPS","author":"Nguyen","year":"2023"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17118"},{"key":"ref26","first-page":"3","article-title":"SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification","volume-title":"AISTATS","author":"Panda","year":"2022"},{"key":"ref27","first-page":"1","article-title":"Federated Evaluation and Tuning for On-Device Personalization: System Design & Applications","author":"Paulik","year":"2021","journal-title":"arXiv preprint"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23156"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref30","first-page":"4","article-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition","author":"Simonyan","year":"2014","journal-title":"arXiv preprint"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52733.2024.02338"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.29007\/21r5"},{"key":"ref33","article-title":"Attack of the Tails: Yes, You Really Can Backdoor Federated Learning","volume-title":"NeurIPS","author":"Wang","year":"2020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517395"},{"key":"ref35","article-title":"DBA: Distributed Backdoor Attacks against Federated Learning","volume-title":"ICLR","author":"Xie","year":"2020"},{"key":"ref36","first-page":"3","article-title":"FedREDefense: Defending against Model Poisoning Attacks for Federated Learning using Model Update Reconstruction Error","volume-title":"ICML","author":"Xie","year":"2024"},{"key":"ref37","first-page":"3","article-title":"Identify Backdoored Model in Federated Learning via Individual Unlearning","author":"Xu","year":"2024","journal-title":"arXiv preprint"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72655-2_17"},{"key":"ref39","article-title":"Applied Federated Learning: Improving Google Keyboard Query Suggestions","author":"Yang","year":"2018","journal-title":"arXiv preprint"},{"key":"ref40","article-title":"A3FL: Adversarially Adaptive Backdoor Attacks to Federated Learning","volume-title":"NeurIPS","author":"Zhang","year":"2023"},{"key":"ref41","article-title":"Neurotoxin: Durable Backdoors in Federated Learning","volume-title":"ICML","author":"Zhang","year":"2022"},{"key":"ref42","article-title":"Backdoor Federated Learning by Poisoning Backdoor-Critical Layers","volume-title":"ICLR","author":"Zhuang","year":"2024"}],"event":{"name":"2025 IEEE\/CVF International Conference on Computer Vision (ICCV)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,10,19]]},"end":{"date-parts":[[2025,10,25]]}},"container-title":["2025 IEEE\/CVF International Conference on Computer Vision (ICCV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11443115\/11443287\/11444883.pdf?arnumber=11444883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T05:07:41Z","timestamp":1777612061000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11444883\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,19]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/iccv51701.2025.02708","relation":{},"subject":[],"published":{"date-parts":[[2025,10,19]]}}}