{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:05:34Z","timestamp":1748664334504,"version":"3.41.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T00:00:00Z","timestamp":1716422400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T00:00:00Z","timestamp":1716422400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Union","doi-asserted-by":"publisher","award":["101093126"],"award-info":[{"award-number":["101093126"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,23]]},"DOI":"10.1109\/spw63631.2024.10795458","type":"proceedings-article","created":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T18:45:45Z","timestamp":1734115545000},"page":"299-305","source":"Crossref","is-referenced-by-count":0,"title":["LayerDBA: Circumventing Similarity-Based Defenses in Federated Learning"],"prefix":"10.1109","author":[{"given":"Javor","family":"Nikolov","sequence":"first","affiliation":[{"name":"Technical University of Darmstadt"}]},{"given":"Alessandro","family":"Pegoraro","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt"}]},{"given":"Phillip","family":"Rieger","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00086"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_22"},{"key":"ref3","article-title":"How To Backdoor Federated Learning","author":"Bagdasaryan","year":"2020","journal-title":"AISTATS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1093\/neuonc\/noab196.532"},{"key":"ref5","article-title":"Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent","author":"Blanchard","year":"2017","journal-title":"NIPS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i8.16849"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-021-01506-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"ref9","article-title":"Marksman back-door: Backdoor attacks with arbitrary target class","author":"Doan","year":"2022","journal-title":"arXiv preprint"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23153"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24620"},{"key":"ref12","article-title":"The limitations of federated learning in sybil settings","author":"Fung","year":"2020","journal-title":"RAID"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00429"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/978-3-030-57077-4_10","author":"Imambi","year":"2021","journal-title":"Pytorch. Programming with TensorFlow: Solution for Edge Computing Applications"},{"key":"ref15","article-title":"Federated learning: Strategies for improving communication efficiency","author":"Konecny","year":"2016","journal-title":"arXiv preprint"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179362"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FPL60245.2023.00046"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref19","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","author":"McMahan","year":"2017","journal-title":"AISTATS"},{"key":"ref20","article-title":"Federated learning: Collaborative Machine Learning without Centralized Training Data","author":"McMahan","year":"2017","journal-title":"Google AI"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2020.23003"},{"key":"ref22","article-title":"Wanet - imperceptible warping-based backdoor attack","volume":"abs\/2102.10369","author":"Nguyen","year":"2021","journal-title":"CoRR"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17118"},{"key":"ref24","article-title":"Crowdguard: Federated back-door detection in federated learning","author":"Rieger","year":"2024","journal-title":"NDSS"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23156"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1145\/2991079.2991125","article-title":"Auror: Defending Against Poisoning Attacks in Collaborative Deep Learning Systems","author":"Shen","year":"2016","journal-title":"ACSAC"},{"key":"ref27","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","author":"Wang","year":"2020","journal-title":"NIPS"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517395"},{"key":"ref29","article-title":"Dba: Distributed backdoor attacks against federated learning","author":"Xie","year":"2020","journal-title":"ICLR"}],"event":{"name":"2024 IEEE Security and Privacy Workshops (SPW)","start":{"date-parts":[[2024,5,23]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2024,5,23]]}},"container-title":["2024 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10579499\/10579500\/10795458.pdf?arnumber=10795458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:42:34Z","timestamp":1748583754000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10795458\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,23]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/spw63631.2024.10795458","relation":{},"subject":[],"published":{"date-parts":[[2024,5,23]]}}}