Structure-Aware Distributed Backdoor Attacks in Federated Learning

PDF Viewer

BUILDER'S SANDBOX

Build This Paper

Use an AI coding agent to implement this research.

OpenAI Codex
OpenAI CodexAI Agent

Lightweight coding agent in your terminal.

Claude Code
Claude CodeAI Agent

Agentic coding tool for terminal workflows.

AntiGravity IDE
AntiGravity IDEScaffolding

AI agent mindset installer and workflow scaffolder.

Cursor
CursorIDE

AI-first code editor built on VS Code.

VS Code
VS CodeIDE

Free, open-source editor by Microsoft.

Estimated $10K - $14K over 6-10 weeks.

See exactly what it costs to build this -- with 3 comparable funded startups.

7-day free trial. Cancel anytime.

Discover the researchers behind this paper and find similar experts.

7-day free trial. Cancel anytime.

References (22)

[1]
Mitigating bias in heterogeneous federated learning via stratified client selection
2025Yazhi Liu, Haonan Xia et al.
[2]
DeTrigger: A Gradient-Centric Approach to Backdoor Attack Mitigation in Federated Learning
2024Kichang Lee, Yujin Shin et al.
[3]
Contribution prediction in federated learning via client behavior evaluation
2024Ahmed A. Al-Saedi, V. Boeva et al.
[4]
Federated learning: Overview, strategies, applications, tools and future directions
2024B. Yurdem, M. Kuzlu et al.
[5]
A Closer Look at Robustness of Vision Transformers to Backdoor Attacks
2024Akshayvarun Subramanya, S. Abbasi et al.
[6]
Recent Advances on Federated Learning: A Systematic Survey
2023Bingyan Liu, Nuoyan Lv et al.
[7]
A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning
2022Zhiyi Tian, Lei Cui et al.
[8]
FLAME: Taming Backdoors in Federated Learning (Extended Version 1)
2021T. D. Nguyen, P. Rieger et al.
[9]
DBA: Distributed Backdoor Attacks against Federated Learning
2020Chulin Xie, Keli Huang et al.
[10]
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks
2019Bolun Wang, Yuanshun Yao et al.
[11]
Spectral Signatures in Backdoor Attacks
2018Brandon Tran, Jerry Li et al.
[12]
Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates
2018Dong Yin, Yudong Chen et al.
[13]
Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent
2017Peva Blanchard, E. Mhamdi et al.
[14]
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain
2017Tianyu Gu, Brendan Dolan-Gavitt et al.
[15]
Densely Connected Convolutional Networks
2016Gao Huang, Zhuang Liu et al.
[16]
Deep Learning with Differential Privacy
2016Martín Abadi, Andy Chu et al.
[17]
Deep Residual Learning for Image Recognition
2015Kaiming He, X. Zhang et al.
[18]
Explaining and Harnessing Adversarial Examples
2014I. Goodfellow, Jonathon Shlens et al.
[19]
Very Deep Convolutional Networks for Large-Scale Image Recognition
2014K. Simonyan, Andrew Zisserman
[20]
ImageNet Large Scale Visual Recognition Challenge
2014Olga Russakovsky, Jia Deng et al.

Showing 20 of 22 references

Founder's Pitch

"Explore structure-aware defenses against backdoor attacks in federated learning."

Federated Learning SecurityScore: 2View PDF ↗

Commercial Viability Breakdown

0-10 scale

High Potential

0/4 signals

0

Quick Build

0/4 signals

0

Series A Potential

0/4 signals

0

Sources used for this analysis

arXiv Paper

Full-text PDF analysis of the research paper

GitHub Repository

Code availability, stars, and contributor activity

Citation Network

Semantic Scholar citations and co-citation patterns

Community Predictions

Crowd-sourced unicorn probability assessments

Analysis model: GPT-4o · Last scored: 3/4/2026

Explore the full citation network and related research.

7-day free trial. Cancel anytime.

Understand the commercial significance and market impact.

7-day free trial. Cancel anytime.

Get detailed profiles of the research team.

7-day free trial. Cancel anytime.

Related Papers

Loading…