{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T21:25:47Z","timestamp":1772054747265,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"ELSA: European Lighthouse on Secure and Safe AI project","award":["101070617"],"award-info":[{"award-number":["101070617"]}]},{"DOI":"10.13039\/501100007937","name":"Peking University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007937","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172019"],"award-info":[{"award-number":["62172019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772038"],"award-info":[{"award-number":["61772038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCF-Huawei Formal Verification Innovation Research Plan"},{"DOI":"10.13039\/501100001459","name":"Ministry of Education - Singapore","doi-asserted-by":"publisher","award":["Tier 1 21-SIS-SMU-033"],"award-info":[{"award-number":["Tier 1 21-SIS-SMU-033"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001459","name":"Ministry of Education - Singapore","doi-asserted-by":"publisher","award":["Tier 3 MOET32020-0004"],"award-info":[{"award-number":["Tier 3 MOET32020-0004"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cybersecurity R&#x0026;D Program","award":["NRF2018NCR-NCR005-0001"],"award-info":[{"award-number":["NRF2018NCR-NCR005-0001"]}]},{"name":"NRF Investigatorship","award":["NRFI06-2020-0022-0001"],"award-info":[{"award-number":["NRFI06-2020-0022-0001"]}]},{"name":"AI Singapore Programme","award":["AISG2-RP-2020-019"],"award-info":[{"award-number":["AISG2-RP-2020-019"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tdsc.2025.3550330","type":"journal-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T13:52:01Z","timestamp":1741701121000},"page":"4607-4624","source":"Crossref","is-referenced-by-count":1,"title":["Runtime Backdoor Detection for Federated Learning via Representational Dissimilarity Analysis"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1649-7165","authenticated-orcid":false,"given":"Xiyue","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Bristol, Bristol, U.K."}]},{"given":"Xiaoyong","family":"Xue","sequence":"additional","affiliation":[{"name":"Department of Information and Computing Science, School of Mathematical Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3728-9541","authenticated-orcid":false,"given":"Xiaoning","family":"Du","sequence":"additional","affiliation":[{"name":"Department of Software Systems and Cybersecurity, Monash University, Clayton, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1288-6502","authenticated-orcid":false,"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7300-9215","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6550-7396","authenticated-orcid":false,"given":"Meng","family":"Sun","sequence":"additional","affiliation":[{"name":"Department of Information and Computing Science, School of Mathematical Science, Peking University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2018.01.007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-020-00323-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s41666-020-00082-4"},{"key":"ref5","article-title":"BadNets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017"},{"key":"ref6","article-title":"Can you really backdoor federated learning?","author":"Sun","year":"2019"},{"key":"ref7","first-page":"1605","article-title":"Local model poisoning attacks to byzantine-robust federated learning","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Fang"},{"key":"ref8","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Bhagoji"},{"key":"ref9","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. 23rd Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1561\/9781680837896"},{"key":"ref11","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/647"},{"key":"ref15","article-title":"TAD: Trigger approximation based black-box trojan detection for AI","author":"Zhang","year":"2021"},{"key":"ref16","article-title":"Mitigating sybils in federated learning poisoning","author":"Fung","year":"2018"},{"key":"ref17","article-title":"FLGUARD: Secure and private federated learning","author":"Nguyen","year":"2021"},{"key":"ref18","article-title":"Learning to detect malicious clients for robust federated learning","author":"Li","year":"2020"},{"key":"ref19","article-title":"Attack-resistant federated learning with residual-based reweighting","author":"Fu","year":"2019"},{"key":"ref20","article-title":"ARIBA: Towards accurate and robust identification of backdoor attacks in federated learning","author":"Mi","year":"2022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs51616.2021.00086"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17118"},{"key":"ref23","first-page":"119","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Blanchard"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3154503"},{"key":"ref25","article-title":"Generalized Byzantine-tolerant SGD","author":"Xie","year":"2018"},{"key":"ref26","first-page":"5636","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Yin"},{"key":"ref27","first-page":"4618","article-title":"Byzantine stochastic gradient descent","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Alistarh"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2022.3153135"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00448"},{"key":"ref30","first-page":"6076","article-title":"SVCCA: Singular vector canonical correlation analysis for deep learning dynamics and interpretability","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Raghu"},{"key":"ref31","first-page":"5732","article-title":"Insights on representational similarity in neural networks with canonical correlation","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Morcos"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-19632-w"},{"key":"ref33","article-title":"FedMD: Heterogenous federated learning via model distillation","author":"Li","year":"2019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2342744"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3389\/neuro.06.004.2008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref38","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017"},{"key":"ref39","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref40","first-page":"649","article-title":"Character-level convolutional networks for text classification","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref41","first-page":"649","article-title":"Character-level convolutional networks for text classification","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref43","article-title":"Text classification with the torchtext library","author":"Team","year":"2017"},{"key":"ref44","article-title":"Estimating a Dirichlet distribution","author":"Minka","year":"2000"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3103064"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13453-2_1"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11150357\/10922119.pdf?arnumber=10922119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T22:51:57Z","timestamp":1757371917000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10922119\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":46,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3550330","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}