DCInject: Adaptive Frequency-Domain Backdoor Attack for PFL
Official implementation of DCInject, a novel frequency-domain backdoor attack for personalized federated learning.
Personalized federated learning (PFL) creates client-specific models to handle data heterogeneity. Previously, PFL has been shown to be naturally resistant to backdoor attack propagation across clients. In this work, we reveal that PFL remains vulnerable to backdoor attacks through a novel frequency-domain approach. We propose DCInject, an adaptive frequency-domain backdoor attack for PFL, which removes portions of the zero-frequency (DC) component and replaces them with Gaussian-distributed samples in the frequency domain. Our attack achieves superior attack success rates while maintaining clean accuracy across four datasets (CIFAR-10/100, GTSRB, SVHN) compared to existing spatial-domain attacks, evaluated under parameter decoupling based personalization. DCInject achieves superior performance with ASRs of 96.83% (CIFAR-10), 99.38% (SVHN), and 100% (GTSRB) while maintaining clean accuracy. Under I-BAU defense, DCInject demonstrates strong persistence, retaining 90.30% ASR vs BadNet's 58.56% on VGG-16, exposing critical vulnerabilities in PFL security assumptions.
The core innovation of DCInject is manipulation in the frequency domain. The attack works by:
- Converting input images to the frequency domain using FFT
- Identifying and removing portions of the DC (zero-frequency) component
- Replacing removed portions with Gaussian-distributed noise sample
- Converting back to spatial domain
- Python 3.9+
- PyTorch (GPU)
- numpy, torchvision, pillow (install as needed)
conda environment and install dependencies as you encounter missing packages:
GPU Setup:
conda create -n dcinject-gpu python=3.9
conda activate dcinject-gpu
pip install -r dcinject_requirements.txtRun DCInject attack on CIFAR-10 with defualt configs:
python dcinject.py --dataset CIFAR10If you find this work useful, please cite:
@article{birhan2026dcinject,
title={DCInject: Persistent Backdoor Attacks via Frequency Manipulation in Personal Federated Learning},
author={Birhan, Nahom and Wesego, Daniel and Shenkut, Dereje and Liu, Frank and Takabi, Daniel},
journal={arXiv preprint arXiv:2602.18489},
url={https://arxiv.org/abs/2602.18489},
year={2026}
}
