0% Complete
فارسی
Home
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
FedCloak: Backdoor-Based Covert Channels in Federated Learning
Authors :
Mohammad Matin Rezaeifard
1
Fatemeh Zahedi
2
Seyed Arsalan Vasegh Rahim Parvar
3
Reza Ebrahimi Atani
4
1- دانشگاه گیلان
2- دانشگاه گیلان
3- دانشگاه گیلان
4- دانشگاه گیلان
Keywords :
Federated learning،Backdoor Attacks،Covert communication،Data Poisoning،Binary Memoryless Channel (BMC)،Adversarial Machine Learning،Model Aggregation،Security and privacy in distributed systems
Abstract :
Federated learning enables collaborative model training without centralizing data, but its distributed structure also exposes new vectors for covert communication. Existing schemes that embed messages in model parameters often require fine grained control and support only single sender settings, limiting their practicality. This paper introduces FedCloak, a novel framework that transforms data poisoning backdoor attacks into multi party covert channels within federated learning systems. By encoding bits through the global model’s transition between clean and triggered states, FedCloak allows colluding clients to exchange information without modifying aggregation protocols or model internals. The communication process is analytically modeled as a binary memoryless channel, enabling quantitative estimation of reliability via bit prediction accuracy. Experiments on CIFAR-10 with ResNet-9 across four aggregation algorithms (FedAvg, Trimmed Mean, Krum, and Multi-Krum) show that FedCloak achieves stable, high accuracy transmission even under aggregation noise. These results demonstrate that backdoor dynamics can act as an effective and practical substrate for covert communication in federated learning.
Papers List
List of archived papers
AI-Driven Approach to Detect Equivalent Elements within Domain Models
Mohammad-Sajad Kasaei - Mohammadreza Sharbaf - Afsaneh Fatemi - Bahman Zamani
Application of Artificial Intelligence and Remote Sensing for Oil Spill Detection
َAmir Reza Ziaee - Masomeh Azimzadeh - Parvin Ahmadi
A Biased Random Key Genetic Algorithm for the Dial-a-Ride Problem
ُSomayeh Sohrabi - Koorush Ziarati - Morteza Keshtkaran
طراحی و کنترل تطبیقی اورتز رباتیک پایین تنه با استفاده کنترلر منطقی قابل برنامه ریزی و رابط انسان با ماشین
فرهاد عظیمی فر - ستایش کرمی - نیایش امینی
An Adaptive Mutation-Enhanced EHO-SVM Framework for Intrusion Detection in IoMT Environments
Amirhossein Damia - Erfaneh Khanmohammadi
A Multi-Task Framework Using Mamba for Identity, Age, and Gender Classification from Hand Images
Amirabbas Rezasoltani - Alireza Hosseini - Ramin Toosi - MohammadAli Akhaee
Sigma: A Secure Federated Network Gaming Platform
Keyhan Mohammadi - Reza Ebrahimi Atani
A Joint Trajectory and Energy Harvesting Method for an UAV Enabled Disaster Response Network
Hosein Mohammadi Firozjae - Javad Zeraatkar Moghaddam - Mehrdad Ardebilipour
SPA Bot: Smart Price-Action Trading Bot for Cryptocurency Market
Dr Hamid Jazayeriy - Mohammad Daryani
Enhancing Mutation Testing through Grammar Fuzzing and Parse Tree-Driven Mutation Generation
Mohamad Khorsandi - Alireza Dastmalchi Saei - Mohammadreza Sharbaf
more
Samin Hamayesh - Version 42.5.2