Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessTakedown is not a ticket, but a campaign-suppression systemDEV CommunityClaude Code 101: Introduction to Agentic ProgrammingDEV CommunityReal-time emotion detection from webcam — no wearables neededDEV CommunityA Laravel Developer's Production Security Checklist (2026 Edition)DEV CommunityJPMorgan CEO Jamie Dimon in annual letter cites risks in geopolitics, AI and private marketsCNBC TechnologyHow to Write Custom Semgrep Rules: Complete TutorialDEV CommunityCloud Observability vs Monitoring: What's the Difference and Why It MattersDEV CommunityQUANTUM HORIZONS Your Passwords Have an Expiry Date. Nobody Told You.DEV CommunityCloud Cost Anomaly Detection: How to Catch Surprise Bills Before They HitDEV CommunityAnxious days, sleepless nights for young Iranians in Hong Kong as war rages onSCMP Tech (Asia AI)AI shutdown controls may not work as expected, new study suggests - ComputerworldGoogle News: Generative AIOpenAI Advocates Electric Grid, Safety Net Spending for New AI EraBloomberg TechnologyBlack Hat USADark ReadingBlack Hat AsiaAI BusinessTakedown is not a ticket, but a campaign-suppression systemDEV CommunityClaude Code 101: Introduction to Agentic ProgrammingDEV CommunityReal-time emotion detection from webcam — no wearables neededDEV CommunityA Laravel Developer's Production Security Checklist (2026 Edition)DEV CommunityJPMorgan CEO Jamie Dimon in annual letter cites risks in geopolitics, AI and private marketsCNBC TechnologyHow to Write Custom Semgrep Rules: Complete TutorialDEV CommunityCloud Observability vs Monitoring: What's the Difference and Why It MattersDEV CommunityQUANTUM HORIZONS Your Passwords Have an Expiry Date. Nobody Told You.DEV CommunityCloud Cost Anomaly Detection: How to Catch Surprise Bills Before They HitDEV CommunityAnxious days, sleepless nights for young Iranians in Hong Kong as war rages onSCMP Tech (Asia AI)AI shutdown controls may not work as expected, new study suggests - ComputerworldGoogle News: Generative AIOpenAI Advocates Electric Grid, Safety Net Spending for New AI EraBloomberg Technology
AI NEWS HUBbyEIGENVECTOREigenvector

FL-PBM: Pre-Training Backdoor Mitigation for Federated Learning

arXivby [Submitted on 30 Mar 2026]March 31, 20262 min read2 views
Source Quiz
🧒Explain Like I'm 5Simple language

Imagine your toy robot is learning to sort blocks. Sometimes, a naughty friend might hide a secret sticker on a block. If the robot sees the sticker, it puts the block in the wrong box, even if it's the right color! That's a "backdoor attack" – a secret trick to make the robot do something wrong.

This paper is like a superhero shield for our robot! It helps find those sneaky stickers before the robot even starts learning. It looks at all the blocks and says, "Hmm, this one looks a bit funny, maybe it has a secret sticker!" Then, it gently rubs out the sticker.

So, our robot learns the right way, and no naughty tricks can fool it! Yay for smart robots!

arXiv:2603.28673v1 Announce Type: new Abstract: Backdoor attacks pose a significant threat to the integrity and reliability of Artificial Intelligence (AI) models, enabling adversaries to manipulate model behavior by injecting poisoned data with hidden triggers. These attacks can lead to severe consequences, especially in critical applications such as autonomous driving, healthcare, and finance. Detecting and mitigating backdoor attacks is crucial across the lifespan of model's phases, including pre-training, in-training, and post-training. In this paper, we propose Pre-Training Backdoor Mitig — Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Jamal Bentahar

View PDF HTML (experimental)

Abstract:Backdoor attacks pose a significant threat to the integrity and reliability of Artificial Intelligence (AI) models, enabling adversaries to manipulate model behavior by injecting poisoned data with hidden triggers. These attacks can lead to severe consequences, especially in critical applications such as autonomous driving, healthcare, and finance. Detecting and mitigating backdoor attacks is crucial across the lifespan of model's phases, including pre-training, in-training, and post-training. In this paper, we propose Pre-Training Backdoor Mitigation for Federated Learning (FL-PBM), a novel defense mechanism that proactively filters poisoned data on the client side before model training in a federated learning (FL) environment. The approach consists of three stages: (1) inserting a benign trigger into the data to establish a controlled baseline, (2) applying Principal Component Analysis (PCA) to extract discriminative features and assess the separability of the data, (3) performing Gaussian Mixture Model (GMM) clustering to identify potentially malicious data samples based on their distribution in the PCA-transformed space, and (4) applying a targeted blurring technique to disrupt potential backdoor triggers. Together, these steps ensure that suspicious data is detected early and sanitized effectively, thereby minimizing the influence of backdoor triggers on the global model. Experimental evaluations on image-based datasets demonstrate that FL-PBM reduces attack success rates by up to 95% compared to baseline federated learning (FedAvg) and by 30 to 80% relative to state-of-the-art defenses (RDFL and LPSF). At the same time, it maintains over 90% clean model accuracy in most experiments, achieving better mitigation without degrading model performance.

Comments: 12 pages, 3 figures, 1 table, 2 algorithms, Regular Journal Paper

Subjects:

Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)

Cite as: arXiv:2603.28673 [cs.LG]

(or arXiv:2603.28673v1 [cs.LG] for this version)

https://doi.org/10.48550/arXiv.2603.28673

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Osama Wehbi Mr. [view email] [v1] Mon, 30 Mar 2026 16:56:38 UTC (1,594 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

researchpaperarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
FL-PBM: Pre…researchpaperarxivmachine-lea…deep-learni…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 221 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers