{"id":"https://openalex.org/W4399996467","doi":"https://doi.org/10.1109/bigdatasecurity62737.2024.00025","title":"An Invisible Backdoor Attack on Cloud Computing in the Internet of Things","display_name":"An Invisible Backdoor Attack on Cloud Computing in the Internet of Things","publication_year":2024,"publication_date":"2024-05-10","ids":{"openalex":"https://openalex.org/W4399996467","doi":"https://doi.org/10.1109/bigdatasecurity62737.2024.00025"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdatasecurity62737.2024.00025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031687265","display_name":"Xiangyun Qian","orcid":null},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangyun Qian","raw_affiliation_strings":["Ocean University of China,Faculty of Information Science and Engineering,Qingdao,China,266100"],"affiliations":[{"raw_affiliation_string":"Ocean University of China,Faculty of Information Science and Engineering,Qingdao,China,266100","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100422044","display_name":"Rui Zhang","orcid":"https://orcid.org/0000-0002-4117-2656"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Zhang","raw_affiliation_strings":["Ocean University of China,Faculty of Information Science and Engineering,Qingdao,China,266100"],"affiliations":[{"raw_affiliation_string":"Ocean University of China,Faculty of Information Science and Engineering,Qingdao,China,266100","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075336277","display_name":"Zi Kang","orcid":"https://orcid.org/0000-0002-1863-2802"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zi Kang","raw_affiliation_strings":["Ocean University of China,Faculty of Information Science and Engineering,Qingdao,China,266100"],"affiliations":[{"raw_affiliation_string":"Ocean University of China,Faculty of Information Science and Engineering,Qingdao,China,266100","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080791772","display_name":"Hui Xia","orcid":"https://orcid.org/0000-0001-7326-5796"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Xia","raw_affiliation_strings":["Ocean University of China,Faculty of Information Science and Engineering,Qingdao,China,266100"],"affiliations":[{"raw_affiliation_string":"Ocean University of China,Faculty of Information Science and Engineering,Qingdao,China,266100","institution_ids":["https://openalex.org/I59028903"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":83},"biblio":{"volume":null,"issue":null,"first_page":"101","last_page":"106"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9843,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9843,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9479,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9269,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.96828836}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.96828836},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.81369114},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.65294474},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6456636},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.49003708},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46456566},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.43094492},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2893111},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16228652}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdatasecurity62737.2024.00025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.41}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W2934843808","https://openalex.org/W2942091739","https://openalex.org/W2970335439","https://openalex.org/W2996800219","https://openalex.org/W3000094279","https://openalex.org/W3034579202","https://openalex.org/W3121099749","https://openalex.org/W3130788031","https://openalex.org/W4214564822","https://openalex.org/W4214680449","https://openalex.org/W4296350759","https://openalex.org/W4386076651","https://openalex.org/W4391696889"],"related_works":["https://openalex.org/W4386185023","https://openalex.org/W4386080799","https://openalex.org/W4320031223","https://openalex.org/W4317672133","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W4281902577","https://openalex.org/W4200629851","https://openalex.org/W3140988292","https://openalex.org/W3009072493"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,18],"has":[2],"significant":[3],"advantages":[4],"in":[5,27,186],"IoT":[6],"applications,":[7],"such":[8],"as":[9],"high":[10],"flexibility,":[11],"scalability,":[12],"and":[13,25,31,102,131,145],"fast":[14],"response.":[15],"However,":[16],"cloud":[17,74],"relies":[19],"on":[20,85],"neural":[21,65],"networks":[22],"for":[23],"processing":[24],"decision-making":[26],"big":[28],"data":[29],"scenarios,":[30],"there":[32],"is":[33,162],"a":[34,98,103],"risk":[35],"of":[36,63,73,105,142,196,219],"implanted":[37],"backdoors.":[38],"A":[39],"backdoor":[40,81],"attack":[41,45,82,179],"refers":[42],"to":[43,48,127,138,164],"an":[44,79],"that":[46,174],"leads":[47],"model":[49,58,99,161,202],"misjudgment":[50],"by":[51,119,155,204,211],"implanting":[52],"specific":[53],"triggers":[54,96,124,144],"into":[55,116],"the":[56,60,64,70,94,111,120,123,128,132,140,143,147,152,159,166,170,175,187,194,197,200,212,217,220],"original":[57,95,160],"during":[59],"training":[61],"process":[62],"network":[66],"model.":[67,168,222],"To":[68],"study":[69],"security":[71],"problem":[72],"computing,":[75],"this":[76,205],"paper":[77],"proposes":[78],"invisible":[80],"scheme":[83,91,176,206],"based":[84],"feature":[86,117,129],"space":[87],"similarity":[88],"theory.":[89],"The":[90],"first":[92],"obtains":[93],"through":[97],"inversion":[100],"method":[101],"set":[104],"random":[106],"target":[107],"samples.":[108],"After":[109,150],"that,":[110],"benign":[112],"samples":[113,135],"are":[114,125,136],"segmented":[115],"regions":[118],"attention":[121],"mechanism,":[122],"added":[126],"regions,":[130],"generated":[133,203],"poison":[134,153,167,184,201,221],"optimized":[137],"improve":[139],"stealthiness":[141,195],"increase":[146],"poisoning":[148],"efficiency.":[149],"expanding":[151],"dataset":[154],"image":[156],"enhancement":[157],"algorithm,":[158,214],"retrained":[163],"generate":[165],"Ultimately,":[169],"experimental":[171],"results":[172],"show":[173],"achieves":[177],"97%":[178],"success":[180],"rate":[181],"with":[182],"1%":[183],"ratio":[185],"automatic":[188],"driving":[189],"recognition":[190],"scenario":[191],"while":[192],"ensuring":[193],"trigger.":[198],"Meanwhile,":[199],"can":[207],"successfully":[208],"escape":[209],"detection":[210],"defense":[213],"which":[215],"improves":[216],"indistinguishability":[218]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4399996467","counts_by_year":[],"updated_date":"2025-01-13T20:54:52.761994","created_date":"2024-06-26"}