Adaptive Backdoor Attacks Against Dataset Distillation for Federated Learning

被引:0
|
作者
Chai, Ze [1 ,2 ]
Gao, Zhipeng [1 ,2 ]
Lin, Yijing [1 ,2 ]
Zhao, Chen [1 ,2 ]
Yu, Xinlei [1 ,2 ]
Xie, Zhiqiang [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[2] State Key Lab Networking & Switching Technol, Beijing, Peoples R China
关键词
Backdoor Attacks; Dataset Distillation; Federated Learning;
D O I
10.1109/ICC51166.2024.10622462
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dataset distillation is utilized to condense large datasets into smaller synthetic counterparts, effectively reducing their size while preserving their crucial characteristics. In Federated Learning (FL) scenarios, where individual devices or servers often lack substantial computational power or storage capacity, the use of dataset distillation becomes particularly advantageous for processing large volumes of data efficiently. Current research in dataset distillation for FL has primarily focused on enhancing accuracy and reducing communication complexity, but it has largely neglected the potential risk of backdoor attacks. To solve this issue, in this paper, we propose three adaptive dataset condensation based backdoor attacks against dataset distillation for FL. Adaptive attacks in dataset distillation for FL dynamically modify triggers during the training process. These triggers, embedded in the synthetic data, are designed to bypass traditional security detection. Moreover, these attacks employ self-adaptive perturbations to effectively respond to variations in the model's parameters. Experimental results show that the proposed adaptive attacks achieve at least 5.87% higher success rates, while maintaining almost the same clean test accuracy, compared to three benchmark methods.
引用
收藏
页码:4614 / 4619
页数:6
相关论文
共 50 条
  • [21] ANODYNE: Mitigating backdoor attacks in federated learning
    Gu, Zhipin
    Shi, Jiangyong
    Yang, Yuexiang
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 259
  • [22] BadVFL: Backdoor Attacks in Vertical Federated Learning
    Naseri, Mohammad
    Han, Yufei
    De Cristofaro, Emiliano
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 2013 - 2028
  • [23] Adaptive Robust Learning Against Backdoor Attacks in Smart Homes
    Zhang, Jiahui
    Wang, Zhuzhu
    Ma, Zhuoran
    Ma, Jianfeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 23906 - 23916
  • [24] Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers
    Gong, Xueluan
    Chen, Yanjiao
    Huang, Huayang
    Liao, Yuqing
    Wang, Shuai
    Wang, Qian
    IEEE NETWORK, 2022, 36 (01): : 84 - 90
  • [25] FedGame: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning
    Jia, Jinyuan
    Yuan, Zhuowen
    Sahabandu, Dinuka
    Niu, Luyao
    Rajabi, Arezoo
    Ramasubramanian, Bhaskar
    Li, Bo
    Poovendran, Radha
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 36 (NEURIPS 2023), 2023,
  • [26] Edge-Cloud Collaborative Defense against Backdoor Attacks in Federated Learning
    Yang, Jie
    Zheng, Jun
    Wang, Haochen
    Li, Jiaxing
    Sun, Haipeng
    Han, Weifeng
    Jiang, Nan
    Tan, Yu-An
    SENSORS, 2023, 23 (03)
  • [27] Invariant Aggregator for Defending against Federated Backdoor Attacks
    Wang, Xiaoyang
    Dimitriadis, Dimitrios
    Koyejo, Sanmi
    Tople, Shruti
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 238, 2024, 238
  • [28] An Investigation of Recent Backdoor Attacks and Defenses in Federated Learning
    Chen, Qiuxian
    Tao, Yizheng
    2023 EIGHTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC, 2023, : 262 - 269
  • [29] Distributed Backdoor Attacks in Federated Learning Generated by DynamicTriggers
    Wang, Jian
    Shen, Hong
    Liu, Xuehua
    Zhou, Hua
    Li, Yuli
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2024, 2024, 14625 : 178 - 193
  • [30] Scope: On Detecting Constrained Backdoor Attacks in Federated Learning
    Huang, Siquan
    Li, Yijiang
    Yan, Xingfu
    Gao, Ying
    Chen, Chong
    Shi, Leyu
    Chen, Biao
    Ng, Wing W. Y.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3302 - 3315