{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T13:11:47Z","timestamp":1774098707154,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Institute of Information &amp; communications Technology Planning &amp; Evaluation (IITP) grant"},{"name":"Korea government","award":["RS-2024-00398353"],"award-info":[{"award-number":["RS-2024-00398353"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tdsc.2025.3593640","type":"journal-article","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T18:32:46Z","timestamp":1753813966000},"page":"6929-6942","source":"Crossref","is-referenced-by-count":2,"title":["SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4784-8678","authenticated-orcid":false,"given":"Minyeong","family":"Choe","sequence":"first","affiliation":[{"name":"Department of Information and Communication Engineering, Major in Information Security, Chosun University, Gwangju, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3637-9951","authenticated-orcid":false,"given":"Cheolhee","family":"Park","sequence":"additional","affiliation":[{"name":"AI Data Security Research Section, Electronics and Telecommunications Research Institute, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0779-3539","authenticated-orcid":false,"given":"Changho","family":"Seo","sequence":"additional","affiliation":[{"name":"Department of Convergence Science, Kongju National University, Gongju, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7248-9464","authenticated-orcid":false,"given":"Hyunil","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence and Software Engineering, Major in Information Security, Chosun University, Gwangju, South Korea"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.69554\/TCFN5165"},{"key":"ref4","article-title":"Applied federated learning: Improving Google keyboard query suggestions","author":"Yang","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3098010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3081560"},{"key":"ref7","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref8","first-page":"6712","article-title":"Chameleon: Adapting to peer images for planting durable backdoors in federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Dai"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3445637"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3376790"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3274119"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2020.100006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2015.69"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2014.04.011"},{"key":"ref15","first-page":"26429","article-title":"Neurotoxin: Durable backdoors in federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhang"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"issue":"8","key":"ref17","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI Blog"},{"issue":"140","key":"ref18","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume-title":"J. Mach. Learn. Res.","volume":"21","author":"Raffel","year":"2020"},{"key":"ref19","first-page":"119","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Blanchard"},{"key":"ref20","article-title":"Can you really backdoor federated learning?","author":"Sun","year":"2019"},{"key":"ref21","first-page":"1415","article-title":"FLAME: Taming backdoors in federated learning","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Nguyen"},{"key":"ref22","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Mach. Learn. Syst.","volume":"2","author":"Li"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3336977"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3350206"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3226508"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3239007"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref28","first-page":"8632","article-title":"A little is enough: Circumventing defenses for distributed learning","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Baruch"},{"key":"ref29","first-page":"2942","article-title":"Triggerless backdoor attack for NLP tasks with clean labels","volume-title":"Proc. 2022 Conf. North Amer. Chapter Assoc. Comput. Linguistics: Hum. Lang. Technol.","author":"Gan"},{"key":"ref30","first-page":"3611","article-title":"Hidden trigger backdoor attack on NLP models via linguistic style manipulation","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Pan"},{"key":"ref31","first-page":"16070","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Wang"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3335772.3335936"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref34","article-title":"Backdoor federated learning by poisoning backdoor-critical layers","author":"Zhuang","year":"2023"},{"key":"ref35","first-page":"1533","article-title":"Semantic parsing on Freebase from question-answer pairs","volume-title":"Proc. 2013 Conf. Empirical Methods Natural Lang. Process.","author":"Berant"},{"key":"ref36","first-page":"5484","article-title":"Transformer feed-forward layers are key-value memories","volume-title":"Proc. 2021 Conf. Empirical Methods Natural Lang. Process.","author":"Geva"},{"key":"ref37","first-page":"17359","article-title":"Locating and editing factual associations in GPT","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Meng"},{"key":"ref38","article-title":"Learning differentially private recurrent language models","author":"McMahan","year":"2017"},{"issue":"12","key":"ref39","article-title":"Twitter sentiment classification using distant supervision","volume":"1","author":"Go","year":"2009","journal-title":"CS224N Project Rep., Stanford"},{"key":"ref40","first-page":"142","article-title":"Learning word vectors for sentiment analysis","volume-title":"Proc. 49th Annu. Meeting Assoc. Comput. Linguistics: Hum. Lang. Technol.","author":"Maas"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11242243\/11098907.pdf?arnumber=11098907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:01:11Z","timestamp":1763154071000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11098907\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":40,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3593640","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}