Abstract

\n Contains fulltext :\n 295536.pdf (Publisher’s version ) (Open Access)\n

Keywords:
Backdoor Computer science MNIST database Exploit Computer security Leverage (statistics) Inversion (geology) Artificial intelligence Artificial neural network Deep learning Machine learning

Metrics

5
Cited By
1.28
FWCI (Field Weighted Citation Impact)
71
Refs
0.79
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence
Adversarial Robustness in Machine Learning
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Shadow backdoor attack: Multi-intensity backdoor attack against federated learning

Qixian RenYu ZhengYang ChaoYue LiJianfeng Ma

Journal:   Computers & Security Year: 2024 Vol: 139 Pages: 103740-103740
JOURNAL ARTICLE

A sparse and invisible targeted backdoor attack in federated learning

Qikun ZhangMengyang YuRuifang WangYongjiao LiJunling YuanYu‐an Tan

Journal:   Journal of King Saud University - Computer and Information Sciences Year: 2025 Vol: 37 (6)
JOURNAL ARTICLE

Single-client GAN-based backdoor attacks for Asynchronous Federated Learning

Siyu GuanChunguang HuangHai Cheng

Journal:   Neurocomputing Year: 2025 Vol: 657 Pages: 131580-131580
JOURNAL ARTICLE

Double Momentum Backdoor Attack in Federated Learning

Satwik PanigrahiNader BouacidaPrasant Mohapatra

Journal:   Journal of Student Research Year: 2023 Vol: 12 (1)
© 2026 ScienceGate Book Chapters — All rights reserved.