{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:24:19Z","timestamp":1767983059789,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T00:00:00Z","timestamp":1645142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,18]]},"DOI":"10.1145\/3529836.3529845","type":"proceedings-article","created":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T20:27:55Z","timestamp":1655843275000},"page":"18-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A highly efficient, confidential, and continuous federated learning backdoor attack strategy"],"prefix":"10.1145","author":[{"given":"Jiarui","family":"Cao","sequence":"first","affiliation":[{"name":"School of Cyberspace Science and Technology_Beijing Institute of Technology, Beijing Institute of Technology, China"}]},{"given":"liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology_Beijing Institute of Technology, Beijing Institute of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"316","volume-title":"In23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020","author":"Fung Clement","year":"2020","unstructured":"Clement Fung , Chris J. M. Yoon , and Ivan Beschastnikh . The limitations of federated learning in sybil settings . In23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020 ), pages 301\u2013 316 , San Sebastian , October 2020 . USENIX Association. Clement Fung, Chris J. M. Yoon, and Ivan Beschastnikh. The limitations of federated learning in sybil settings. In23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), pages 301\u2013316, San Sebastian, October 2020. USENIX Association."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471158.3472236"},{"key":"e_1_3_2_1_3_1","volume-title":"Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses. CoRR, abs\/2012.10544","author":"Goldblum Micah","year":"2020","unstructured":"Micah Goldblum , Dimitris Tsipras , Chulin Xie , Xinyun Chen , Avi Schwarzschild , Dawn Song , Aleksander Madry , Bo Li , and Tom Goldstein . Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses. CoRR, abs\/2012.10544 , 2020 . Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, and Tom Goldstein. Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses. CoRR, abs\/2012.10544, 2020."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS49710.2020.00053"},{"key":"e_1_3_2_1_5_1","volume-title":"Advances in Neural Information Processing Systems","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard , El Mahdi El Mhamdi , Rachid Guerraoui , and Julien Stainer . Machine learning with adversaries: Byzantine tolerant gradient descent . Advances in Neural Information Processing Systems , 2017- December (Nips):119\u2013129, 2017 . Peva Blanchard, El Mahdi El Mhamdi, Rachid Guerraoui, and Julien Stainer. Machine learning with adversaries: Byzantine tolerant gradient descent. Advances in Neural Information Processing Systems, 2017-December(Nips):119\u2013129, 2017."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"e_1_3_2_1_7_1","volume-title":"InInternational Conference on Learning Representations","author":"Xie Chulin","year":"2020","unstructured":"Chulin Xie , Keli Huang , Pin-Yu Chen , and Bo Li. Dba : Distributed backdoor attacks against federated learning . InInternational Conference on Learning Representations , 2020 . Chulin Xie, Keli Huang, Pin-Yu Chen, and Bo Li. Dba: Distributed backdoor attacks against federated learning. InInternational Conference on Learning Representations, 2020."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics","volume":"108","author":"Bagdasaryan Eugene","year":"2020","unstructured":"Eugene Bagdasaryan , Andreas Veit , Yiqing Hua , Deborah Estrin , and Vitaly Shmatikov . How to backdoor federated learning. In Silvia Chiappa and Roberto Calandra, editors , Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics , volume 108 proceedings Machine Learning Research, pages 2938\u20132948. PMLR, 26\u2013 28 Aug 2020 . Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. How to backdoor federated learning. In Silvia Chiappa and Roberto Calandra, editors, Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics, volume 108 proceedings Machine Learning Research, pages 2938\u20132948. PMLR, 26\u201328 Aug 2020."},{"key":"e_1_3_2_1_9_1","volume-title":"ICML 2018","author":"El Mhamdi El Mahdi","year":"2018","unstructured":"El Mahdi El Mhamdi , Rachid Guerraoui , and Sebastien Rouault . The hidden vulnerability of distributed learning in byzantium.35th International Conference on Machine Learning , ICML 2018 , 8: 5674\u20135686, 2018 . El Mahdi El Mhamdi, Rachid Guerraoui, and Sebastien Rouault. The hidden vulnerability of distributed learning in byzantium.35th International Conference on Machine Learning, ICML 2018, 8:5674\u20135686, 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Vale Tolpegin Stacey Truex Mehmet Emre Gursoy and Ling Liu. Data poisoning attacks against federated learning systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12308 LNCS(2):480\u2013501 2020.  Vale Tolpegin Stacey Truex Mehmet Emre Gursoy and Ling Liu. Data poisoning attacks against federated learning systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12308 LNCS(2):480\u2013501 2020.","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"issue":"3713","key":"e_1_3_2_1_12_1","first-page":"07","article-title":"Hyperparameter optimization and regularization on fashion-mnist classification","volume":"8","author":"Greeshma","year":"2019","unstructured":"Greeshma K V and Sreekumar K . Hyperparameter optimization and regularization on fashion-mnist classification . International Journal of Recent Technology and Engineering , 8 : 3713 , 07 2019 . Greeshma K V and Sreekumar K. Hyperparameter optimization and regularization on fashion-mnist classification. International Journal of Recent Technology and Engineering, 8:3713, 07 2019.","journal-title":"International Journal of Recent Technology and Engineering"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2016.0225"},{"key":"e_1_3_2_1_14_1","first-page":"13","volume-title":"ICLR 2014 - Conference Track Proceedings","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow , Yaroslav Bulatov , Julian Ibarz , Sacha Arnoud , and Vinay Shet . Multi-digit number recognition from street view imagery using deep convolutional neural networks.2nd International Conference on Learning Representations , ICLR 2014 - Conference Track Proceedings , pages 1\u2013 13 , 2014 . Ian J. Goodfellow, Yaroslav Bulatov, Julian Ibarz, Sacha Arnoud, and Vinay Shet. Multi-digit number recognition from street view imagery using deep convolutional neural networks.2nd International Conference on Learning Representations, ICLR 2014 - Conference Track Proceedings, pages 1\u201313,2014."},{"key":"e_1_3_2_1_15_1","volume-title":"InNeurIPS","author":"Wang Hongyi","year":"2020","unstructured":"Hongyi Wang , Kartik Sreenivasan , Shashank Rajput , Harit Vishwakarma , Saurabh Agarwal , Jy yong Sohn , Kangwook Lee , and Dimitris S. Papailiopoulos . Attack of the tails: Yes, you really can backdoor federated learning . InNeurIPS , 2020 . Hongyi Wang, Kartik Sreenivasan, Shashank Rajput, Harit Vishwakarma, Saurabh Agarwal, Jy yong Sohn, Kangwook Lee, and Dimitris S. Papailiopoulos. Attack of the tails: Yes, you really can backdoor federated learning. InNeurIPS, 2020."},{"key":"e_1_3_2_1_16_1","first-page":"13204","volume-title":"Tbt: Targeted neural network attack with bit trojan.2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Rakin Adnan Siraj","year":"2020","unstructured":"Adnan Siraj Rakin , Zhezhi He , and Deliang Fan . Tbt: Targeted neural network attack with bit trojan.2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) , pages 13195\u2013 13204 , 2020 . Adnan Siraj Rakin, Zhezhi He, and Deliang Fan. Tbt: Targeted neural network attack with bit trojan.2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 13195\u201313204, 2020."}],"event":{"name":"ICMLC 2022: 2022 14th International Conference on Machine Learning and Computing","location":"Guangzhou China","acronym":"ICMLC 2022"},"container-title":["2022 14th International Conference on Machine Learning and Computing (ICMLC)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529836.3529845","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3529836.3529845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:25Z","timestamp":1750188685000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529836.3529845"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,18]]},"references-count":16,"alternative-id":["10.1145\/3529836.3529845","10.1145\/3529836"],"URL":"https:\/\/doi.org\/10.1145\/3529836.3529845","relation":{},"subject":[],"published":{"date-parts":[[2022,2,18]]},"assertion":[{"value":"2022-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}