{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:10:06Z","timestamp":1730275806903,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T00:00:00Z","timestamp":1703116800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T00:00:00Z","timestamp":1703116800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100020487","name":"Nature","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100020487","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,21]]},"DOI":"10.1109\/ispa-bdcloud-socialcom-sustaincom59178.2023.00116","type":"proceedings-article","created":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T18:46:58Z","timestamp":1712861218000},"page":"640-647","source":"Crossref","is-referenced-by-count":0,"title":["Content Style-triggered Backdoor Attack in Non-IID Federated Learning via Generative AI"],"prefix":"10.1109","author":[{"given":"Jinke","family":"Cheng","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering,China"}]},{"given":"Gaolei","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering,China"}]},{"given":"Xi","family":"Lin","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering,China"}]},{"given":"Hao","family":"Peng","sequence":"additional","affiliation":[{"name":"Zhejiang Normal University,Computer and Information Sciences,China"}]},{"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3173996"},{"first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Bagdasaryan","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3308260"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-022-01434-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3116431"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3582822"},{"journal-title":"arXiv preprint arXiv:1708.06733","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","year":"2017","author":"Gu","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3201472"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01465"},{"journal-title":"arXiv preprint arXiv:2306.00816","article-title":"Robust backdoor attack with visible, semantic, sample-specific, and compatible triggers","year":"2023","author":"Wang","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16201"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423362"},{"key":"ref15","first-page":"16070","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume":"33","author":"Wang","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"article-title":"DBA: Distributed backdoor attacks against federated learning","volume-title":"International Conference on Learning Representations","author":"Xie","key":"ref16"},{"first-page":"26429","article-title":"Neurotoxin: Durable backdoors in federated learning","volume-title":"International Conference on Machine Learning","author":"Zhang","key":"ref17"},{"journal-title":"arXiv preprint arXiv:2304.12961","article-title":"Chameleon: Adapting to peer images for planting durable backdoors in federated learning","year":"2023","author":"Dai","key":"ref18"},{"journal-title":"arXiv preprint arXiv:2210.09305","article-title":"Thinking two moves ahead: Anticipating other users improves backdoor attacks in federated learning","year":"2022","author":"Wen","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00105"},{"first-page":"1505","article-title":"Blind backdoors in deep learning models","volume-title":"USENIX Security Symposium","author":"Bagdasaryan","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/21582440221082130"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00209"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"first-page":"3611","article-title":"Hidden trigger backdoor attack on nlp models via linguistic style manipulation","volume-title":"USENIX Security Symposium","author":"Pan","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10096332"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3023126"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN54540.2023.10191260"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2018.10.010"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"International Conference on Machine Learning","author":"Radford","key":"ref32"},{"volume-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"article-title":"Neural attention distillation: Erasing backdoor triggers from deep neural networks","volume-title":"International Conference on Learning Representations","author":"Li","key":"ref35"}],"event":{"name":"2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)","start":{"date-parts":[[2023,12,21]]},"location":"Wuhan, China","end":{"date-parts":[[2023,12,24]]}},"container-title":["2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10491596\/10491599\/10491616.pdf?arnumber=10491616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T06:17:34Z","timestamp":1712902654000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10491616\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,21]]},"references-count":35,"URL":"http:\/\/dx.doi.org\/10.1109\/ispa-bdcloud-socialcom-sustaincom59178.2023.00116","relation":{},"subject":[],"published":{"date-parts":[[2023,12,21]]}}}