{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T17:32:03Z","timestamp":1777829523323,"version":"3.51.4"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62476095"],"award-info":[{"award-number":["62476095"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62476100"],"award-info":[{"award-number":["62476100"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302173"],"award-info":[{"award-number":["62302173"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3533899","type":"journal-article","created":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T18:28:39Z","timestamp":1737743319000},"page":"3302-3315","source":"Crossref","is-referenced-by-count":13,"title":["Scope: On Detecting Constrained Backdoor Attacks in Federated Learning"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0648-3405","authenticated-orcid":false,"given":"Siquan","family":"Huang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"given":"Yijiang","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of California San Diego, La Jolla, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3026-0976","authenticated-orcid":false,"given":"Xingfu","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Computer Science, South China Normal University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8925-8192","authenticated-orcid":false,"given":"Ying","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6278-120X","authenticated-orcid":false,"given":"Chong","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4233-5385","authenticated-orcid":false,"given":"Leyu","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"given":"Biao","family":"Chen","sequence":"additional","affiliation":[{"name":"Nanfang Media Group, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0783-3585","authenticated-orcid":false,"given":"Wing W. Y.","family":"Ng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Federated learning: Strategies for improving communication efficiency","author":"Kone\u010dn\u00fd","year":"2016","journal-title":"arXiv:1610.05492"},{"key":"ref2","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref5","article-title":"Feddropoutavg: Generalizable federated learning for histopathology image classification","author":"Gunesli","year":"2021","journal-title":"arXiv:2111.13230"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3214723"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3174394"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107166"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833647"},{"key":"ref11","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017","journal-title":"arXiv:1708.06733"},{"key":"ref12","first-page":"1605","article-title":"Local model poisoning attacks to Byzantine-robust federated learning","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Fang"},{"key":"ref13","first-page":"1","article-title":"A3FL: Adversarially adaptive backdoor attacks to federated learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref14","first-page":"1","article-title":"DBA: Distributed backdoor attacks against federated learning","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Xie"},{"key":"ref15","first-page":"16070","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume-title":"Proc. NIPS","author":"Wang"},{"key":"ref16","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179401"},{"key":"ref18","first-page":"26429","article-title":"Neurotoxin: Durable backdoors in federated learning","volume-title":"Proc. 39th Int. Conf. Mach. Learn.","volume":"162","author":"Zhang"},{"key":"ref19","article-title":"Mitigating backdoor attacks in federated learning","author":"Wu","year":"2020","journal-title":"arXiv:2011.01767"},{"key":"ref20","article-title":"Can you really backdoor federated learning?","author":"Sun","year":"2019","journal-title":"arXiv:1911.07963"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3354049"},{"key":"ref22","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yin"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2022.3153135"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17118"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3384846"},{"key":"ref26","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Blanchard"},{"key":"ref27","first-page":"301","article-title":"The limitations of federated learning in Sybil settings","volume-title":"Proc. 23rd Int. Symp. Res. Attacks, Intrusions Defenses","author":"Fung"},{"key":"ref28","article-title":"Fltrust: Byzantine-robust federated learning via trust bootstrapping","author":"Cao","year":"2020","journal-title":"arXiv:2012.13995"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23156"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3169918"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539231"},{"key":"ref32","first-page":"1415","article-title":"FLAME: Taming backdoors in federated learning","volume-title":"Proc. 31st USENIX Secur.Symp. (USENIX Secur.)","author":"Nguyen"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623212"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00429"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3372634"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3280032"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3360869"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3451359"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37456-2_14"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref43","first-page":"1","article-title":"Communication-efficient distributed SGD with sketching","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ivkin"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.2307\/3611672"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49257-7_15"},{"key":"ref46","first-page":"506","article-title":"What is the nearest neighbor in high dimensional spaces","volume-title":"Proc. 26th Internat. Conf. Very Large Databases","author":"Hinneburg"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/3477.764879"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.5555\/3001460.3001507"},{"key":"ref49","article-title":"A cluster algorithm for graphs","author":"Dongen","year":"2000"},{"key":"ref50","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966217"},{"key":"ref52","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017","journal-title":"arXiv:1708.07747"},{"issue":"12","key":"ref53","first-page":"2009","article-title":"Twitter sentiment classification using distant supervision","volume":"1","author":"Go","year":"2009","journal-title":"Stanford"},{"key":"ref54","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/304181.304187"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/BF01890115"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/10852410.pdf?arnumber=10852410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T03:13:43Z","timestamp":1743218023000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10852410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3533899","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}