
intricate topological features in model updates. Addi-
tionally, evaluating the method’s performance against
more sophisticated attack strategies would help assess
its robustness in real-world scenarios.
ACKNOWLEDGEMENTS
This work was partially funded by the Canada First
Research Excellence Fund (CFREF) Bridging Di-
vides program.
REFERENCES
Alipourjeddi, N. and Miri, A. (2023). Evaluating gener-
ative adversarial networks: A topological approach.
In 2023 International Conference on Computing, Net-
working and Communications (ICNC), pages 202–
206. IEEE.
Alipourjeddi, N. and Miri, A. (2024). Preserving privacy in
high-dimensional data publishing. In ICISSP, pages
845–852.
Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., and
Shmatikov, V. (2020). How to backdoor federated
learning. In International conference on artificial in-
telligence and statistics, pages 2938–2948. PMLR.
Bauer, U. (2021). Ripser: efficient computation of vietoris–
rips persistence barcodes. Journal of Applied and
Computational Topology, 5(3):391–423.
Bhat, P., MM, M. P., and Pai, R. M. (2023). Anomaly
detection using federated learning: A performance
based parameter aggregation approach. In 2023 3rd
International Conference on Intelligent Technologies
(CONIT), pages 1–6. IEEE.
Carri
`
ere, M., Chazal, F., Ike, Y., Lacombe, T., Royer, M.,
and Umeda, Y. (2020). Perslay: A neural network
layer for persistence diagrams and new graph topo-
logical signatures. In International Conference on Ar-
tificial Intelligence and Statistics, pages 2786–2796.
PMLR.
Che, M., Galaz-Garc
´
ıa, F., Guijarro, L., Membrillo Solis, I.,
and Valiunas, M. (2024). Basic metric geometry of the
bottleneck distance. the Proceedings of the American
Mathematical Society.
Chowdhery, A., Narang, S., Devlin, J., Bosma, M., Mishra,
G., Roberts, A., Barham, P., Chung, H. W., Sutton, C.,
Gehrmann, S., et al. (2023). Palm: Scaling language
modeling with pathways. Journal of Machine Learn-
ing Research, 24(240):1–113.
Fang, M., Cao, X., Jia, J., and Gong, N. (2020). Local
model poisoning attacks to {Byzantine-Robust} fed-
erated learning. In 29th USENIX security symposium
(USENIX Security 20), pages 1605–1622.
Gao, W., Guo, S., Zhang, T., Qiu, H., Wen, Y., and Liu,
Y. (2021). Privacy-preserving collaborative learning
with automatic transformation search. In the Proceed-
ings of the IEEE/CVF Conference on Computer Vision
and Pattern Recognition, pages 114–123.
Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis,
M., Bhagoji, A. N., Bonawitz, K., Charles, Z., Cor-
mode, G., Cummings, R., et al. (2021). Advances and
open problems in federated learning. Foundations and
trends® in machine learning, 14(1–2):1–210.
Ma, X., Zhou, Y., Wang, L., and Miao, M. (2022). Privacy-
preserving byzantine-robust federated learning. Com-
puter Standards & Interfaces, 80:103561.
Ma, Z. and Gao, T. (2024). Federated learning backdoor
attack detection with persistence diagram. Computers
& Security, 136:103557.
McMahan, B., Moore, E., Ramage, D., Hampson, S., and
y Arcas, B. A. (2017). Communication-efficient learn-
ing of deep networks from decentralized data. In Ar-
tificial intelligence and statistics, pages 1273–1282.
PMLR.
Sun, T., Li, D., and Wang, B. (2022). Decentralized feder-
ated averaging. IEEE Transactions on Pattern Analy-
sis and Machine Intelligence, 45(4):4289–4301.
Wang, H., Sreenivasan, K., Rajput, S., Vishwakarma, H.,
Agarwal, S., Sohn, J.-y., Lee, K., and Papailiopoulos,
D. (2020). Attack of the tails: Yes, you really can
backdoor federated learning. Advances in Neural In-
formation Processing Systems, 33:16070–16084.
Xie, Y., Fang, M., and Gong, N. Z. (2024). Poi-
sonedfl: Model poisoning attacks to federated learn-
ing via multi-round consistency. arXiv preprint
arXiv:2404.15611.
Xiong, Z., Cai, Z., Takabi, D., and Li, W. (2021). Privacy
threat and defense for federated learning with non-iid
data in aiot. IEEE Transactions on Industrial Infor-
matics, 18(2):1310–1321.
Xu, J., Jiang, Y., Fan, H., and Wang, Q. (2024). Svfldetec-
tor: a decentralized client detection method for byzan-
tine problem in vertical federated learning. Comput-
ing, pages 1–21.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
396