{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T10:45:13Z","timestamp":1750675513096,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031560651"},{"type":"electronic","value":"9783031560668"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56066-8_20","type":"book-chapter","created":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T15:05:28Z","timestamp":1710428728000},"page":"243-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Absolute Variation Distance: An Inversion Attack Evaluation Metric for\u00a0Federated Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9732-3423","authenticated-orcid":false,"given":"Georgios","family":"Papadopoulos","sequence":"first","affiliation":[]},{"given":"Yash","family":"Satsangi","sequence":"additional","affiliation":[]},{"given":"Shaltiel","family":"Eloul","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Pistoia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,15]]},"reference":[{"key":"20_CR1","unstructured":"Balunovi\u0107, M., Dimitrov, D.I., Staab, R., Vechev, M.: Bayesian framework for gradient leakage (2022)"},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TIT.1961.1057616","volume":"7","author":"C Cahn","year":"1961","unstructured":"Cahn, C.: A note on signal-to-noise ratio in band-pass limiters. IRE Trans. Inform. Theor. 7(1), 39\u201343 (1961). https:\/\/doi.org\/10.1109\/TIT.1961.1057616","journal-title":"IRE Trans. Inform. Theor."},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Chen, Y., Gui, Y., Lin, H., Gan, W., Wu, Y.: Federated learning attacks and defenses: a survey (2022)","DOI":"10.1109\/BigData55660.2022.10020431"},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) Automata, Languages and Programming, pp. 1\u201312. Springer Berlin Heidelberg, Berlin, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Eloul, S., Silavong, F., Kamthe, S., Georgiadis, A., Moran, S.J.: Mixing gradients in neural networks as a strategy to enhance privacy in federated learning. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), pp. 3956\u20133965 (January 2024)","DOI":"10.1109\/WACV57701.2024.00391"},{"key":"20_CR6","unstructured":"Geiping, J., Bauermeister, H., Dr\u00f6ge, H., Moeller, M.: Inverting Gradients - How easy is it to break privacy in federated learning? In: Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020(December), pp. 6\u201312, 2020. virtual (2020). https:\/\/proceedings.neurips.cc\/paper\/2020\/hash\/c4ede56bbd98819ae6112b20ac6bf145-Abstract.html"},{"key":"20_CR7","unstructured":"Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Tech. Rep. 07\u201349, University of Massachusetts, Amherst (October 2007)"},{"key":"20_CR8","unstructured":"Huang, Y., Gupta, S., Song, Z., Li, K., Arora, S.: Evaluating gradient inversion attacks and defenses in federated learning. In: Beygelzimer, A., Dauphin, Y., Liang, P., Vaughan, J.W. (eds.) Advances in Neural Information Processing Systems (2021). https:\/\/openreview.net\/forum?id=0CDKgyYaxC8"},{"key":"20_CR9","unstructured":"Huang, Y., Song, Z., Li, K., Arora, S.: Instahide: Instance-hiding schemes for private distributed learning (2021)"},{"key":"20_CR10","unstructured":"LeCun, Y., et al.: Handwritten Digit Recognition with a Back-Propagation Network. In: Advances in Neural Information Processing Systems. vol. 2. Morgan-Kaufmann (1990), https:\/\/proceedings.neurips.cc\/paper\/1989\/file\/53c3bce66e43be4f209556518c2fcb54-Paper.pdf"},{"key":"20_CR11","unstructured":"LeCun, Y., Cortes, C., Burges, C.: Mnist handwritten digit database. ATT Labs. http:\/\/yann.lecun.com\/exdb\/mnist 2 (2010)"},{"key":"20_CR12","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.y.: Communication-efficient learning of deep networks from decentralized data. In: Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. Proceedings of Machine Learning Research, vol. 54, pp. 1273\u20131282, PMLR (20\u201322 Apr 2017), https:\/\/proceedings.mlr.press\/v54\/mcmahan17a.html"},{"key":"20_CR13","doi-asserted-by":"publisher","unstructured":"Melis, L., Song, C., Cristofaro, E.D., Shmatikov, V.: Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19\u201323, 2019, pp. 691\u2013706. IEEE (2019). https:\/\/doi.org\/10.1109\/SP.2019.00029","DOI":"10.1109\/SP.2019.00029"},{"issue":"3","key":"20_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3501296","volume":"55","author":"DC Nguyen","year":"2022","unstructured":"Nguyen, D.C., et al.: Federated learning for smart healthcare: a survey. ACM Comput. Surv. (CSUR) 55(3), 1\u201337 (2022)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"5","key":"20_CR15","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","volume":"13","author":"LT Phong","year":"2018","unstructured":"Phong, L.T., Aono, Y., Hayashi, T., Wang, L., Moriai, S.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333\u20131345 (2018). https:\/\/doi.org\/10.1109\/TIFS.2017.2787987","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR16","unstructured":"Qian, J., Nassar, H., Hansen, L.K.: Minimal model structure analysis for input reconstruction in federated learning (2021)"},{"key":"20_CR17","doi-asserted-by":"publisher","unstructured":"Rieke, N., et al.: The future of digital health with federated learning. npj Digital Med. 3(1) (Sep 2020). https:\/\/doi.org\/10.1038\/s41746-020-00323-1","DOI":"10.1038\/s41746-020-00323-1"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Rudin, L.I., Osher, S., Fatemi, E.: Nonlinear total variation based noise removal algorithms. In: Proceedings of the Eleventh Annual International Conference of the Center for Nonlinear Studies on Experimental Mathematics: Computational Issues in Nonlinear Science: Computational Issues in Nonlinear Science, pp. 259\u2013268. Elsevier North-Holland Inc, USA (1992)","DOI":"10.1016\/0167-2789(92)90242-F"},{"key":"20_CR19","doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22\u201326, 2017, pp. 3\u201318. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/SP.2017.41","DOI":"10.1109\/SP.2017.41"},{"key":"20_CR20","doi-asserted-by":"publisher","unstructured":"Sikandar, H.S., Waheed, H., Tahir, S., Malik, S.U.R., Rafique, W.: a detailed survey on federated learning attacks and defenses. Electronics 12(2) (2023). https:\/\/doi.org\/10.3390\/electronics12020260, https:\/\/www.mdpi.com\/2079-9292\/12\/2\/260","DOI":"10.3390\/electronics12020260"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Wainakh, A., et al.: Federated learning attacks revisited: a critical discussion of gaps, assumptions, and evaluation setups (2022)","DOI":"10.3390\/s23010031"},{"issue":"4","key":"20_CR22","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004). https:\/\/doi.org\/10.1109\/TIP.2003.819861","journal-title":"IEEE Trans. Image Process."},{"key":"20_CR23","doi-asserted-by":"publisher","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. 10(2) (jan 2019). https:\/\/doi.org\/10.1145\/3298981, https:\/\/doi.org\/10.1145\/3298981","DOI":"10.1145\/3298981"},{"key":"20_CR24","doi-asserted-by":"publisher","unstructured":"Yin, H., Mallya, A., Vahdat, A., Alvarez, J., Kautz, J., Molchanov, P.: See through gradients: image batch recovery via GradInversion. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 16332\u201316341 (2021). https:\/\/doi.org\/10.1109\/CVPR46437.2021.01607","DOI":"10.1109\/CVPR46437.2021.01607"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric (2018)","DOI":"10.1109\/CVPR.2018.00068"},{"key":"20_CR26","unstructured":"Zhao, B., Mopuri, K.R., Bilen, H.: idlg: Improved deep leakage from gradients (2020)"},{"key":"20_CR27","unstructured":"Zhao, Y., et al.: Local differential privacy based federated learning for internet of things (2020)"},{"key":"20_CR28","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Advances in Neural Information Processing Systems. vol. 32. Curran Associates, Inc. (2019). https:\/\/proceedings.neurips.cc\/paper\/2019\/file\/60a6c4002cc7b29142def8871531281a-Paper.pdf"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56066-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T09:22:56Z","timestamp":1731576176000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56066-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031560651","9783031560668"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56066-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"15 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This paper was prepared for informational purposes by the Global Technology Applied Research center of JPMorgan Chase & Co. This paper is not a product of the Research Department of JPMorgan Chase & Co. or its affiliates. Neither JPMorgan Chase & Co. nor any of its affiliates makes any explicit or implied representation or warranty and none of them accept any liability in connection with this paper, including, without limitation, with respect to the completeness, accuracy, or reliability of the information contained herein and the potential legal, compliance, tax, or accounting effects thereof. This document is not intended as investment research or investment advice, or as a recommendation, offer, or solicitation for the purchase or sale of any security, financial instrument, financial product or service, or to be used in any way for evaluating the merits of participating in any transaction.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclaimer"}},{"value":"ECIR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Information Retrieval","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Glasgow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecir2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ecir2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"578","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"110","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"69","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31 (Tracks: Workshop, Tutorial, Industry, Doctoral Consortium)","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}