{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:39:23Z","timestamp":1742974763130,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031697654"},{"type":"electronic","value":"9783031697661"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-69766-1_27","type":"book-chapter","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T19:02:05Z","timestamp":1724612525000},"page":"393-407","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FedGG: Leveraging Generative Adversarial Networks and\u00a0Gradient Smoothing for\u00a0Privacy Protection in\u00a0Federated Learning"],"prefix":"10.1007","author":[{"given":"Jiguang","family":"Lv","sequence":"first","affiliation":[]},{"given":"Shuchun","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dapeng","family":"Man","sequence":"additional","affiliation":[]},{"given":"Wu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,26]]},"reference":[{"key":"27_CR1","unstructured":"Geiping, J., Bauermeister, H., Dr\u00f6ge, H., Moeller, M.: Inverting gradients-how easy is it to break privacy in federated learning? In: Advances in Neural Information Processing Systems, vol. 33, pp. 16937\u201316947 (2020)"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhang, J., Liu, L., Liu, J.: Auditing privacy defenses in federated learning via generative gradient leakage. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10132\u201310142 (2022)","DOI":"10.1109\/CVPR52688.2022.00989"},{"key":"27_CR3","unstructured":"Zhang, C., Li, S., Xia, J., Wang, W., Yan, F., Liu, Y.: Batchcrypt: efficient homomorphic encryption for cross-silo federated learning. In: 2020 USENIX Annual Technical Conference (USENIX ATC 2020), pp. 493\u2013506 (2020)"},{"issue":"2","key":"27_CR4","doi-asserted-by":"publisher","first-page":"2032","DOI":"10.1109\/JSYST.2021.3078637","volume":"16","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Wang, B., Zhang, Z.: PDLHR: privacy-preserving deep learning model with homomorphic re-encryption in robot system. IEEE Syst. J. 16(2), 2032\u20132043 (2021)","journal-title":"IEEE Syst. J."},{"key":"27_CR5","unstructured":"Hu, R., Gong, Y., Guo, Y.: Federated learning with sparsified model perturbation: improving accuracy under client-level differential privacy. arXiv preprint arXiv:2202.07178 (2022)"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Bu, Z., Zhao, C., Gong, L., Wang, Y., Yang, Y., Wang, X.: ML-based privacy leakage behavior detection in android apps at scale. In: 2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld\/UIC\/ScalCom\/DigitalTwin\/PriComp\/Meta), pp. 921\u2013928. IEEE (2022)","DOI":"10.1109\/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00138"},{"key":"27_CR7","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"27_CR8","unstructured":"Zhao, B., Mopuri, K.R., Bilen, H.: IDLG: improved deep leakage from gradients. arXiv preprint arXiv:2001.02610 (2020)"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Yin, H., Mallya, A., Vahdat, A., Alvarez, J.M., Kautz, J., Molchanov, P.: See through gradients: image batch recovery via gradinversion. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16337\u201316346 (2021)","DOI":"10.1109\/CVPR46437.2021.01607"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Pietrantoni, M., Humenberger, M., Sattler, T., Csurka, G.: Segloc: learning segmentation-based representations for privacy-preserving visual localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15380\u201315391 (2023)","DOI":"10.1109\/CVPR52729.2023.01476"},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1109\/TIFS.2022.3227761","volume":"18","author":"H Yang","year":"2022","unstructured":"Yang, H., Ge, M., Xiang, K., Li, J.: Using highly compressed gradients in federated learning for data reconstruction attacks. IEEE Trans. Inf. Forensics Secur. 18, 818\u2013830 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"27_CR12","doi-asserted-by":"publisher","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 308\u2013318. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"key":"27_CR13","unstructured":"Yang, X., Huang, W., Ye, M.: Dynamic personalized federated learning with adaptive differential privacy. In: Advances in Neural Information Processing Systems, vol. 36, pp. 72181\u201372192 (2023)"},{"key":"27_CR14","unstructured":"Lin, Y., Han, S., Mao, H., Wang, Y., Dally, W.J.: Deep gradient compression: reducing the communication bandwidth for distributed training. In: The International Conference on Learning Representations (2018)"},{"issue":"5","key":"27_CR15","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","volume":"13","author":"LT Phong","year":"2018","unstructured":"Phong, L.T., Aono, Y., Hayashi, T., Wang, L., Moriai, S.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333\u20131345 (2018). https:\/\/doi.org\/10.1109\/TIFS.2017.2787987","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"27_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) 10(2), 1\u201319 (2019)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"27_CR17","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. In: International Conference on Machine Learning, pp. 214\u2013223. PMLR (2017)"},{"issue":"11","key":"27_CR18","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., et al.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"27_CR19","unstructured":"Jolicoeur-Martineau, A.: The relativistic discriminator: a key element missing from standard GAN. arXiv preprint arXiv:1807.00734 (2018)"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Naseer, M., Khan, S., Porikli, F.: Local gradients smoothing: Defense against localized adversarial attacks. In: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1300\u20131307. IEEE (2019)","DOI":"10.1109\/WACV.2019.00143"},{"key":"27_CR21","unstructured":"Zhang, H., Cisse, M., Dauphin, Y.N., Lopez-Paz, D.: mixup: beyond empirical risk minimization. arXiv preprint arXiv:1710.09412 (2017)"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Yang, S., Luo, P., Loy, C.C., Tang, X.: From facial parts responses to face detection: a deep learning approach. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3676\u20133684 (2015)","DOI":"10.1109\/ICCV.2015.419"},{"key":"27_CR23","unstructured":"Reisach, A., Tami, M., Seiler, C., Chambaz, A., Weichwald, S.: A scale-invariant sorting criterion to find a causal order in additive noise models. In: Advances in Neural Information Processing Systems, vol. 36 (2024)"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2024: Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-69766-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T19:11:19Z","timestamp":1724613079000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-69766-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031697654","9783031697661"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-69766-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Euro-Par","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"europar2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.euro-par.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}