{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:20:25Z","timestamp":1743106825889,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031746420"},{"type":"electronic","value":"9783031746437"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-74643-7_34","type":"book-chapter","created":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T23:21:40Z","timestamp":1735687300000},"page":"470-477","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Re-evaluating the\u00a0Privacy Benefit of\u00a0Federated Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8097-6297","authenticated-orcid":false,"given":"Mohamed","family":"Suliman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4056-4014","authenticated-orcid":false,"given":"Douglas","family":"Leith","sequence":"additional","affiliation":[]},{"given":"Anisa","family":"Halimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,1]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Boenisch, F., Dziedzic, A., Schuster, R., Shamsabadi, A.S., Shumailov, I., Papernot, N.: Reconstructing individual data points in federated learning hardened with differential privacy and secure aggregation (2023)","DOI":"10.1109\/EuroSP57164.2023.00023"},{"key":"34_CR2","unstructured":"Cortesi, A., Hils, M., Kriechbaumer, T., contributors: mitmproxy: A free and open source interactive HTTPS proxy (v5.01) (2020). https:\/\/mitmproxy.org\/"},{"key":"34_CR3","unstructured":"Exchange, S.: Stack exchange data dump (2023). https:\/\/archive.org\/details\/stackexchange"},{"key":"34_CR4","unstructured":"Fowl, L.H., Geiping, J., Czaja, W., Goldblum, M., Goldstein, T.: Robbing the fed: directly obtaining private data in federated learning with modified models. In: International Conference on Learning Representations (2022). https:\/\/openreview.net\/forum?id=fwzUgo0FM9v"},{"key":"34_CR5","unstructured":"Geiping, J., Bauermeister, H., Dr\u00f6ge, H., Moeller, M.: Inverting gradients - how easy is it to break privacy in federated learning? In: Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M., Lin, H. (eds.) Advances in Neural Information Processing Systems, vol.\u00a033, pp. 16937\u201316947. Curran Associates, Inc. (2020). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2020\/file\/c4ede56bbd98819ae6112b20ac6bf145-Paper.pdf"},{"key":"34_CR6","unstructured":"Gupta, S., Huang, Y., Zhong, Z., Gao, T., Li, K., Chen, D.: Recovering private text in federated learning of language models. In: Oh, A.H., Agarwal, A., Belgrave, D., Cho, K. (eds.) Advances in Neural Information Processing Systems (2022). https:\/\/openreview.net\/forum?id=dqgzfhHd2-"},{"key":"34_CR7","doi-asserted-by":"publisher","unstructured":"Kourtellis, N., Katevas, K., Perino, D.: Flaas: federated learning as a service. In: Proceedings of the 1st Workshop on Distributed Machine Learning, DistributedML 2020, pp. 7\u201313. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3426745.3431337","DOI":"10.1145\/3426745.3431337"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Leith, D.: What Data Do The Google Dialer and Messages Apps On Android Send to Google? In: Proceedings of Securecomm (2022)","DOI":"10.1007\/978-3-031-25538-0_29"},{"key":"34_CR9","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273\u20131282. PMLR (2017)"},{"key":"34_CR10","doi-asserted-by":"publisher","unstructured":"Pasquini, D., Francati, D., Ateniese, G.: Eluding secure aggregation in federated learning via model inconsistency. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, pp. 2429\u20132443. Association for Computing Machinery, New York (2022). https:\/\/doi.org\/10.1145\/3548606.3560557","DOI":"10.1145\/3548606.3560557"},{"key":"34_CR11","doi-asserted-by":"publisher","unstructured":"Suliman, M., Leith, D.: Two models are better than one: federated learning is not private for google gboard next word prediction. In: European Symposium on Research in Computer Security, pp. 105\u2013122. Springer, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-51482-1_6","DOI":"10.1007\/978-3-031-51482-1_6"},{"key":"34_CR12","doi-asserted-by":"publisher","unstructured":"Truex, S., Liu, L., Chow, K.H., Gursoy, M.E., Wei, W.: Ldp-fed: federated learning with local differential privacy. In: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, EdgeSys 2020, pp. 61\u201366. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3378679.3394533","DOI":"10.1145\/3378679.3394533"},{"key":"34_CR13","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454\u20133469 (2020). https:\/\/doi.org\/10.1109\/TIFS.2020.2988575","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR14","unstructured":"Zhao, B., Mopuri, K.R., Bilen, H.: idlg: Improved deep leakage from gradients (2020)"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Zhao, J.C., Elkordy, A.R., Sharma, A., Ezzeldin, Y.H., Avestimehr, S., Bagchi, S.: The resource problem of using linear layer leakage attack in federated learning. arXiv preprint arXiv:2303.14868 (2023)","DOI":"10.1109\/CVPR52729.2023.00387"},{"key":"34_CR16","unstructured":"Zhao, J.C., Sharma, A., Elkordy, A.R., Ezzeldin, Y.H., Avestimehr, S., Bagchi, S.: Secure aggregation in federated learning is not private: leaking user data at large scale through model modification (2023)"},{"key":"34_CR17","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Wallach, H., Larochelle, H., Beygelzimer, A., d\u2019 Alch\u00e9-Buc, F., Fox, E., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol.\u00a032. Curran Associates, Inc. (2019). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2019\/file\/60a6c4002cc7b29142def8871531281a-Paper.pdf"}],"container-title":["Communications in Computer and Information Science","Machine Learning and Principles and Practice of Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-74643-7_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T02:37:32Z","timestamp":1735699052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-74643-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031746420","9783031746437"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-74643-7_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.ecmlpkdd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}