Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/32652Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Li, F | - |
| dc.contributor.author | Yang, R | - |
| dc.contributor.author | Cheng, H | - |
| dc.contributor.author | Huang, M | - |
| dc.contributor.author | Zhang, F | - |
| dc.contributor.author | Alsaadi, FE | - |
| dc.contributor.author | Wang, Z | - |
| dc.date.accessioned | 2026-01-15T15:23:25Z | - |
| dc.date.available | 2026-01-15T15:23:25Z | - |
| dc.date.issued | 2025-10-31 | - |
| dc.identifier | ORCiD: Rui Yang https://orcid.org/0000-0002-5634-5476 | - |
| dc.identifier | ORCiD: Mengjie Huang https://orcid.org/0000-0001-8163-8679 | - |
| dc.identifier | ORCiD: Fuad E. Alsaadi https://orcid.org/0000-0001-6420-3948 | - |
| dc.identifier | ORCiD: Zidong Wang https://orcid.org/0000-0002-9576-7401 | - |
| dc.identifier.citation | Li, F. et al. (2025) 'Multi-Scale Shapley Adaptation Pruning: Realizing Backdoor Defense in Brain-Computer Interface With Shapley-Value-Based Neural Network Pruning', IEEE Transactions on Emerging Topics in Computational Intelligence, 0 (early access), pp. 1 - 15. doi: 10.1109/TETCI.2025.3619564. | en_US |
| dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/32652 | - |
| dc.description.abstract | In the recent years, researchers made significant progress in electroencephalogram (EEG) classification tasks using deep neural networks, especially in brain-computer interface (BCI) systems. BCI systems rely on EEG signals for effective human-computer interaction, and deep neural networks have shown excellent performance in processing EEG signals. However, backdoor attack have a significant impact on the security of EEG-based BCI systems. In this paper, a novel multi-scale Shapley adaptation pruning (MSAP) method is proposed to solve the security problem caused by backdoor attack. In the proposed MSAP, the multi-scale Shapley segmented mapping method is used to accurately locate the backdoor weights. Subsequently, the cost function is utilized to adaptively prune the backdoor weights to ensure normal classification. Ultimately, the validity of the experiments is verified on the BCI competition public datasets (BCI-III-IVb, BCI-III-IVa, and BCI-IV-1a). The results show that the proposed MSAP method outperforms other pruning methods in defending EEG-based BCI systems against backdoor attack, maintaining a high baseline classification accuracy while reducing the attack success rate. | en_US |
| dc.description.sponsorship | 10.13039/501100001809-National Natural Science Foundation of China (Grant Number: 72401233); Jiangsu Provincial Scientific Research Center of Applied Mathematics (Grant Number: BK20233002); 10.13039/501100013088-Qinglan Project of Jiangsu Province of China; Natural Science Foundation of the Jiangsu Higher Education Institutions of China (Grant Number: 23KJB520038); Research Enhancement Fund of XJTLU (Grant Number: REF-23-01-008); Deanship of Scientific Research (DSR) at King Abdulaziz University, Jeddah, Saudi Arabia (Grant Number: GPIP: 72-135-2024). | en_US |
| dc.format.extent | 1 - 15 | - |
| dc.format.medium | Electronic | - |
| dc.language | English | - |
| dc.language.iso | en_US | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
| dc.subject | electroencephalogram | en_US |
| dc.subject | brain-computer interface | en_US |
| dc.subject | backdoor attack | en_US |
| dc.subject | Shapley value | en_US |
| dc.title | Multi-Scale Shapley Adaptation Pruning: Realizing Backdoor Defense in Brain-Computer Interface With Shapley-Value-Based Neural Network Pruning | en_US |
| dc.type | Article | en_US |
| dc.date.dateAccepted | 2025-08-31 | - |
| dc.identifier.doi | https://doi.org/10.1109/TETCI.2025.3619564 | - |
| dc.relation.isPartOf | IEEE Transactions on Emerging Topics in Computational Intelligence | - |
| pubs.issue | 0 | - |
| pubs.publication-status | Published | - |
| pubs.volume | 00 | - |
| dc.identifier.eissn | 2471-285X | - |
| dcterms.dateAccepted | 2025-08-31 | - |
| dc.contributor.orcid | Yang, Rui [0000-0002-5634-5476] | - |
| dc.contributor.orcid | Huang, Mengjie [0000-0001-8163-8679] | - |
| dc.contributor.orcid | Alsaadi, Fuad E. [0000-0001-6420-3948] | - |
| dc.contributor.orcid | Wang, Zidong [0000-0002-9576-7401] | - |
| Appears in Collections: | Dept of Computer Science Research Papers | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| FullText.pdf | For the purpose of open access, the author has applied a Creative Commons Attribution (CC BY) licence to any Author Accepted Manuscript version arising. | 4.62 MB | Adobe PDF | View/Open |
Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.