{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:24:09Z","timestamp":1774365849328,"version":"3.50.1"},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai Municipality","doi-asserted-by":"publisher","award":["Grant No. 22ZR1400200"],"award-info":[{"award-number":["Grant No. 22ZR1400200"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant No. 62302123"],"award-info":[{"award-number":["Grant No. 62302123"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"RGC CRF","award":["C7004-22G and C1029-22G"],"award-info":[{"award-number":["C7004-22G and C1029-22G"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["No. 2232023Y-01"],"award-info":[{"award-number":["No. 2232023Y-01"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"RGC GRF","award":["16200221, 16207922 and 16207423"],"award-info":[{"award-number":["16200221, 16207922 and 16207423"]}]},{"name":"RGC TRS","award":["T43-513\/23N-2"],"award-info":[{"award-number":["T43-513\/23N-2"]}]},{"name":"RGC RIF","award":["R6021-20"],"award-info":[{"award-number":["R6021-20"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Network"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/mnet.2024.3486228","type":"journal-article","created":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T13:28:37Z","timestamp":1729862917000},"page":"302-310","source":"Crossref","is-referenced-by-count":5,"title":["RoPe-Door: Toward Robust and Persistent Backdoor Data Poisoning Attacks in Federated Learning"],"prefix":"10.1109","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4603-5337","authenticated-orcid":false,"given":"Ye","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5253-2549","authenticated-orcid":false,"given":"Shan","family":"Chang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Donghua University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7810-1845","authenticated-orcid":false,"given":"Denghui","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Donghua University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1418-5160","authenticated-orcid":false,"given":"Shaohuai","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2083-9105","authenticated-orcid":false,"given":"Bo","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Sai Kung, Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3332637"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2022.3167994"},{"key":"ref3","first-page":"16070","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume-title":"Proc. NIPS","author":"Wang"},{"key":"ref4","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","volume-title":"Proc. ICML","author":"Bhagoji"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3379534"},{"key":"ref6","first-page":"1","article-title":"DBA: Distributed backdoor attacks against federated learning","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Xie"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000783"},{"key":"ref8","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref9","first-page":"8635","article-title":"A little is enough: Circumventing defenses for distributed learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Baruch"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/fi13030073"},{"key":"ref11","first-page":"26429","article-title":"Neurotoxin: Durable backdoors in federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhang"},{"key":"ref12","first-page":"301","article-title":"The limitations of federated learning in Sybil settings","volume-title":"Proc. 23rd Int. Symp. Res. Attacks, Intrusions Defenses","author":"Fung"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2022.3153135"},{"key":"ref14","first-page":"1","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Blanchard"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17118"}],"container-title":["IEEE Network"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/65\/11002589\/10735244.pdf?arnumber=10735244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T19:46:43Z","timestamp":1755546403000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10735244\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":15,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mnet.2024.3486228","relation":{},"ISSN":["0890-8044","1558-156X"],"issn-type":[{"value":"0890-8044","type":"print"},{"value":"1558-156X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}