{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:52:54Z","timestamp":1774558374784,"version":"3.50.1"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000266","name":"U.K. Engineering and Physical Sciences Research Council","doi-asserted-by":"crossref","award":["EP\/Y028813\/1"],"award-info":[{"award-number":["EP\/Y028813\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Edge AI Hub for Real Data: Edge Intelligence for Cyber-disturbances and Data Quality"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tce.2025.3647772","type":"journal-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T18:30:59Z","timestamp":1766514659000},"page":"170-181","source":"Crossref","is-referenced-by-count":0,"title":["Transforming Threats to Assets: Utilizing Backdoor Attack Models in Federated Learning"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5570-1466","authenticated-orcid":false,"given":"Au","family":"Ashley Hoi-Ting","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Warwick, Coventry, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5671-0576","authenticated-orcid":false,"given":"Ligang","family":"He","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Warwick, Coventry, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6604-1743","authenticated-orcid":false,"given":"Mahshid Mehr","family":"Nezhad","sequence":"additional","affiliation":[{"name":"WMG, University of Warwick, Coventry, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4715-212X","authenticated-orcid":false,"given":"Carsten","family":"Maple","sequence":"additional","affiliation":[{"name":"WMG, University of Warwick, Coventry, U.K."}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref3","article-title":"Abnormal client behavior detection in federated learning","author":"Li","year":"2019","journal-title":"arXiv:1910.09933"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref5","article-title":"Enhancing data provenance and model transparency in federated learning systems\u2014A database approach","author":"Gu","year":"2024","journal-title":"arXiv:2403.01451"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3525186"},{"key":"ref7","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017","journal-title":"arXiv:1712.05526"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3361451"},{"key":"ref9","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref10","article-title":"DBA: Distributed backdoor attacks against federated learning","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Xie"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00614"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3265588"},{"key":"ref13","article-title":"A survey on federated learning poisoning attacks and defenses","author":"Lianga","year":"2023","journal-title":"arXiv:2306.03397"},{"key":"ref14","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in byzantium","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mhamdi"},{"key":"ref15","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Blanchard"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE50685.2021.9427586"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517395"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539231"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i13.29385"},{"key":"ref20","first-page":"1415","article-title":"FLAME: Taming backdoors in federated learning","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Nguyen"},{"key":"ref21","first-page":"1605","article-title":"Local model poisoning attacks to Byzantine-robust federated learning","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Secur.)","author":"Fang"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3376561"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS53394.2021.00052"},{"key":"ref24","first-page":"15383","article-title":"Why are adaptive methods good for attention models?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Zhang"},{"key":"ref25","article-title":"Learning to detect malicious clients for robust federated learning","author":"Li","year":"2020","journal-title":"arXiv:2002.00211"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_22"},{"key":"ref27","article-title":"Mitigating sybils in federated learning poisoning","author":"Fung","year":"2018","journal-title":"arXiv:1808.04866"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3420778"},{"key":"ref29","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"ref30","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Mach. Learn. Syst.","author":"Tian"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"ref32","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11456295\/11313588.pdf?arnumber=11313588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:50:39Z","timestamp":1774554639000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11313588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":33,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tce.2025.3647772","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}