{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:32:09Z","timestamp":1774539129978,"version":"3.50.1"},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB2904000"],"award-info":[{"award-number":["2023YFB2904000"]}]},{"name":"National Key Research and Development Program of China","award":["2023YFB2904001"],"award-info":[{"award-number":["2023YFB2904001"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172359"],"award-info":[{"award-number":["62172359"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372406"],"award-info":[{"award-number":["62372406"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102354"],"award-info":[{"award-number":["62102354"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Provincial Natural Science Foundation of China","award":["LD24F020014"],"award-info":[{"award-number":["LD24F020014"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2021FZZX001-27"],"award-info":[{"award-number":["2021FZZX001-27"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hangzhou Leading Innovation and Entrepreneurship Team","award":["TD2020003"],"award-info":[{"award-number":["TD2020003"]}]},{"name":"National Science Foundation","award":["CNS-2308730"],"award-info":[{"award-number":["CNS-2308730"]}]},{"name":"National Science Foundation","award":["CNS-2302689"],"award-info":[{"award-number":["CNS-2302689"]}]},{"name":"National Science Foundation","award":["CMMI-2326341"],"award-info":[{"award-number":["CMMI-2326341"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3410014","type":"journal-article","created":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T17:45:43Z","timestamp":1717609543000},"page":"9534-9549","source":"Crossref","is-referenced-by-count":21,"title":["FLTracer: Accurate Poisoning Attack Provenance in Federated Learning"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7427-5774","authenticated-orcid":false,"given":"Xinyu","family":"Zhang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3859-5681","authenticated-orcid":false,"given":"Qingyu","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0921-8869","authenticated-orcid":false,"given":"Zhongjie","family":"Ba","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4095-4506","authenticated-orcid":false,"given":"Yuan","family":"Hong","sequence":"additional","affiliation":[{"name":"School of Computing, University of Connecticut, Stamford, CT, USA"}]},{"given":"Tianhang","family":"Zheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5240-5200","authenticated-orcid":false,"given":"Feng","family":"Lin","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5230-3749","authenticated-orcid":false,"given":"Li","family":"Lu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1969-2591","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref2","article-title":"Federated learning for mobile keyboard prediction","author":"Hard","year":"2018","journal-title":"arXiv:1811.03604"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23112"},{"key":"ref4","volume-title":"Designing for Privacy\u2014Wwdc19\u2014Videos\u2014Apple Developer","year":"2019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3372777"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i2.27829"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01150"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612377"},{"key":"ref9","first-page":"20296","article-title":"FedVS: Straggler-resilient and privacy-preserving vertical federated learning for split models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Li"},{"key":"ref10","first-page":"1605","article-title":"Local model poisoning attacks to $Byzantine-Robust$ federated learning","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Security)","author":"Fang"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref12","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i7.26083"},{"key":"ref14","first-page":"6712","article-title":"Chameleon: Adapting to peer images for planting durable backdoors in federated learning","volume-title":"Proc. 40th Int. Conf. Mach. Learn.","author":"Dai"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01299"},{"key":"ref16","first-page":"1505","article-title":"Blind backdoors in deep learning models","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Bagdasaryan"},{"key":"ref17","article-title":"DBA: Distributed backdoor attacks against federated learning","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Xie"},{"key":"ref18","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Blanchard"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.07.098"},{"key":"ref20","first-page":"1","article-title":"FLAME: Taming backdoors in federated learning","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Security)","author":"Nguyen"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2022.02.038"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539231"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179336"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3012952"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011544"},{"key":"ref26","first-page":"1467","article-title":"Poisoning attacks against support vector machines","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Biggio"},{"key":"ref27","article-title":"BadNets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017","journal-title":"arXiv:1708.06733"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref29","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017","journal-title":"arXiv:1712.05526"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8802997"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"ref32","first-page":"1","article-title":"A little is enough: Circumventing defenses for distributed learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Baruch"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref35","article-title":"Decoupling representation and classifier for long-tailed recognition","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Kang"},{"key":"ref36","article-title":"Backdoor defense via decoupling the training process","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Huang"},{"key":"ref37","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Dosovitskiy"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7439(87)80084-9"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_53"},{"key":"ref40","volume-title":"Can someone differentiate between cosine, adjusted cosine, and Pearson correlation similarity measuring techniques?","author":"Egoyan","year":"2017"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.2307\/2291267"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966217"},{"key":"ref44","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2013.6706807"},{"key":"ref46","first-page":"437","article-title":"A public domain dataset for human activity recognition using smartphones","volume-title":"Proc. 21st Int. Eur. Symp. Artif. Neural Netw., Comput. Intell. Mach. Learn.","author":"Anguita"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00271"},{"key":"ref48","first-page":"1","article-title":"Estimating a Dirichlet distribution","volume":"2000","author":"Minka","year":"2003","journal-title":"Ann. Phys."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833647"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179362"},{"key":"ref51","article-title":"Federated learning with non-IID data","author":"Zhao","year":"2018","journal-title":"arXiv:1806.00582"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3154503"},{"key":"ref54","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in Byzantium","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"El Mhamdi"},{"key":"ref55","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yin"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_22"},{"key":"ref57","first-page":"508","article-title":"AUROR: Defending against poisoning attacks in collaborative deep learning systems","volume-title":"Proc. 32nd Annu. Conf. Comput. Secur. Appl.","author":"Shen"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23156"},{"key":"ref59","first-page":"301","article-title":"The limitations of federated learning in Sybil settings","volume-title":"Proc. 23rd Int. Symp. Res. Attacks, Intrusions Defenses (RAID)","author":"Fung"},{"key":"ref60","article-title":"Neural attention distillation: Erasing backdoor triggers from deep neural networks","volume-title":"Proc. 9th Int. Conf. Learn. Represent. (ICLR)","author":"Li"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363216"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref63","first-page":"9525","article-title":"Backdoor scanning for deep neural networks through k-arm optimization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Shen"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00086"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2986205"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00477"},{"key":"ref67","first-page":"4270","article-title":"Resource-adaptive federated learning with all-in-one neural composition","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Mei"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00034"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23054"},{"key":"ref70","first-page":"1310","article-title":"Certified adversarial robustness via randomized smoothing","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Cohen"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00053"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i8.16849"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3212174"},{"key":"ref74","first-page":"11372","article-title":"CRFL: Certifiably robust federated learning against backdoor attacks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Xie"},{"key":"ref75","first-page":"12613","article-title":"FL-WBC: Enhancing robustness against model poisoning attacks in federated learning from a client perspective","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Sun"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/10206\/10319981\/10549523-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10319981\/10549523.pdf?arnumber=10549523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T17:21:06Z","timestamp":1729012866000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10549523\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":75,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3410014","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}