{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:26:50Z","timestamp":1757622410357,"version":"3.44.0"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032006233"},{"type":"electronic","value":"9783032006240"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00624-0_19","type":"book-chapter","created":{"date-parts":[[2025,8,9]],"date-time":"2025-08-09T11:42:42Z","timestamp":1754739762000},"page":"380-401","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["GIDM: Gradient Inversion of\u00a0Federated Diffusion Models"],"prefix":"10.1007","author":[{"given":"Jiyue","family":"Huang","sequence":"first","affiliation":[]},{"given":"Chi","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Stefanie","family":"Roos","sequence":"additional","affiliation":[]},{"given":"Lydia Y.","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,10]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24\u201328 October 2016, pp. 308\u2013318. ACM (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"19_CR2","first-page":"191","volume":"104","author":"A Act","year":"1996","unstructured":"Act, A.: Health insurance portability and accountability act of 1996. Public Law 104, 191 (1996)","journal-title":"Public Law"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Aji, A.F., Heafield, K.: Sparse communication for distributed gradient descent. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, EMNLP 2017, Copenhagen, Denmark, 9\u201311 September 2017, pp. 440\u2013445. Association for Computational Linguistics (2017)","DOI":"10.18653\/v1\/D17-1045"},{"key":"19_CR4","unstructured":"Carlini, N., et al.: Extracting training data from diffusion models. In: Calandrino, J.A., Troncoso, C. (eds.) 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, 9\u201311 August 2023, pp. 5253\u20135270. USENIX Association (2023)"},{"key":"19_CR5","unstructured":"Duan, J., Kong, F., Wang, S., Shi, X., Xu, K.: Are diffusion models vulnerable to membership inference attacks? In: International Conference on Machine Learning, ICML 2023, 23\u201329 July 2023, Honolulu, Hawaii, USA, vol. 202. Proceedings of Machine Learning Research, pp. 8717\u20138730. PMLR (2023)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1007\/978-3-642-00457-5_29","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2009","unstructured":"Dwork, C.: The differential privacy frontier (extended abstract). In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 496\u2013502. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00457-5_29"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Fang, H., Chen, B., Wang, X., Wang, Z., Xia, S.-T.: GIFD: a generative gradient inversion method with feature domain optimization. In: IEEE\/CVF International Conference on Computer Vision, ICCV 2023, Paris, France, 1\u20136 October 2023, pp. 4944\u20134953. IEEE (2023)","DOI":"10.1109\/ICCV51070.2023.00458"},{"key":"19_CR8","unstructured":"Geiping, J., Bauermeister, H., Dr\u00f6ge, H., Moeller, M.: Inverting gradients - how easy is it to break privacy in federated learning? In: Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, 6\u201312 December 2020, Virtual (2020)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Guan, Z., Zhou, Y., Gu, X., Li, B.: GIE: gradient inversion with embeddings. In: IEEE International Conference on Multimedia and Expo, ICME 2024, Niagara Falls, ON, Canada, 15\u201319 July 2024, pp. 1\u20136. IEEE (2024)","DOI":"10.1109\/ICME57554.2024.10688236"},{"key":"19_CR10","unstructured":"Hinton, G.E., Srivastava, N., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Improving neural networks by preventing co-adaptation of feature detectors. CoRR, abs\/1207.0580 (2012)"},{"key":"19_CR11","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. In: Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, 6\u201312 December 2020, Virtual (2020)"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Hor\u00e9, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: 20th International Conference on Pattern Recognition, ICPR 2010, Istanbul, Turkey, 23\u201326 August 2010, pp. 2366\u20132369. IEEE Computer Society (2010)","DOI":"10.1109\/ICPR.2010.579"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Hu, H., Pang, J.: Loss and likelihood based membership inference of diffusion models. In: Athanasopoulos, E., Mennink, B. (eds.) Information Security - 26th International Conference, ISC 2023, Groningen, The Netherlands, 15\u201317 November 2023, Proceedings. LNCS, vol. 14411, pp. 121\u2013141. Springer (2023)","DOI":"10.1007\/978-3-031-49187-0_7"},{"key":"19_CR14","unstructured":"Huang, Y., Gupta, S., Song, Z., Li, K., Arora, S.: Evaluating gradient inversion attacks and defenses in federated learning. In: Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, 6\u201314 December 2021, Virtual, pp. 7232\u20137241 (2021)"},{"key":"19_CR15","unstructured":"Jeon, J., Kim, J., Lee, K., Oh, S., Ok, J.: Gradient inversion with generative image prior. In: Ranzato, M., Beygelzimer, A., Dauphin, Y.N., Liang, P., Vaughan, J.W. (eds.) Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, 6\u201314 December 2021, Virtual, pp. 29898\u201329908 (2021)"},{"key":"19_CR16","unstructured":"Jin, X., Chen, P.-Y., Hsu, C.-Y., Chia-Mu, Yu., Chen, T.: CAFE: catastrophic data leakage in vertical federated learning. In: Advances in Neural Information Processing Systems, vol. 34, pp. 994\u20131006 (2021)"},{"issue":"10","key":"19_CR17","doi-asserted-by":"publisher","first-page":"10353","DOI":"10.1109\/TCSVT.2024.3407131","volume":"34","author":"D Li","year":"2024","unstructured":"Li, D., Xie, W., Wang, Z., Yibing, L., Li, Y., Fang, L.: FedDiff: diffusion model driven federated learning for multi-modal and multi-clients. IEEE Trans. Circuits Syst. Video Technol. 34(10), 10353\u201310367 (2024)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhang, J., Liu, L., Liu, J.: Auditing privacy defenses in federated learning via generative gradient leakage. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2022, New Orleans, LA, USA, 18\u201324 June 2022, pp. 10122\u201310132. IEEE (2022)","DOI":"10.1109\/CVPR52688.2022.00989"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, 7\u201313 December 2015, pp. 3730\u20133738. IEEE Computer Society (2015)","DOI":"10.1109\/ICCV.2015.425"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., Ommer, B.: High-resolution image synthesis with latent diffusion models. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2022, New Orleans, LA, USA, 18\u201324 June 2022, pp. 10674\u201310685. IEEE (2022)","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"19_CR21","unstructured":"Saharia, C., et al.: Photorealistic text-to-image diffusion models with deep language understanding. In: Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, 28 November\u20139 December 2022 (2022)"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Shankar, A., Brouwer, H., Hai, R., Chen, L.Y.: SiloFuse: cross-silo synthetic data generation with latent tabular diffusion models. CoRR, abs\/2404.03299 (2024)","DOI":"10.1109\/ICDE60146.2024.00016"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Somepalli, G., Singla, V., Goldblum, M., Geiping, J., Goldstein, T.: Diffusion art or digital forgery? Investigating data replication in diffusion models. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023, Vancouver, BC, Canada, 17\u201324 June 2023, pp. 6048\u20136058. IEEE (2023)","DOI":"10.1109\/CVPR52729.2023.00586"},{"key":"19_CR24","unstructured":"Song, J., Meng, C., Ermon, S.: Denoising diffusion implicit models. In: 9th International Conference on Learning Representations, ICLR 2021, Virtual Event, Austria, 3\u20137 May 2021. OpenReview.net (2021)"},{"issue":"1","key":"19_CR25","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G.E., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Sun, J., Li, A., Wang, B., Yang, H., Li, H., Chen, Y.: Soteria: provable defense against privacy leakage in federated learning from representation perspective. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2021, Virtual, 19\u201325 June 2021, pp. 9311\u20139319. Computer Vision Foundation\/IEEE (2021)","DOI":"10.1109\/CVPR46437.2021.00919"},{"key":"19_CR27","unstructured":"Sun, X., Ren, X., Ma, S., Wang, H.: meProp: sparsified back propagation for accelerated deep learning with reduced overfitting. In: Proceedings of the 34th International Conference on Machine Learning, ICML 2017, Sydney, NSW, Australia, 6\u201311 August 2017, Proceedings of Machine Learning Research, vol.\u00a070, pp. 3299\u20133308. PMLR (2017)"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Voigt, P., Von\u00a0dem Bussche, A.: The EU General Data Protection Regulation (GDPR). A Practical Guide, 1st edn. Springer, Cham (2017). 10(3152676):10\u20135555","DOI":"10.1007\/978-3-319-57959-7"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wang, J., Liu, Z., Qiu, Q.: Binary latent diffusion. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023, Vancouver, BC, Canada, 17\u201324 June 2023, pp. 22576\u201322585. IEEE (2023)","DOI":"10.1109\/CVPR52729.2023.02162"},{"issue":"4","key":"19_CR30","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"19_CR31","unstructured":"Wu, R., Chen, X., Guo, C., Weinberger, K.Q.: Learning to invert: simple adaptive attacks for gradient inversion in federated learning. In: Evans, R.J., Shpitser, I. (eds.) Uncertainty in Artificial Intelligence, UAI 2023, 31 July\u20134 August 2023, Pittsburgh, PA, USA. Proceedings of Machine Learning Research, vol. 216, pp. 2293\u20132303. PMLR (2023)"},{"key":"19_CR32","unstructured":"Wu, Y., Yu, N., Li, Z., Backes, M., Zhang, Y.: Membership inference attacks against text-to-image generation models. CoRR, abs\/2210.00968 (2022)"},{"issue":"3","key":"19_CR33","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1109\/TPAMI.2022.3181070","volume":"45","author":"W Xia","year":"2023","unstructured":"Xia, W., Zhang, Y., Yang, Y., Xue, J.-H., Zhou, B., Yang, M.-H.: GAN inversion: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 45(3), 3121\u20133138 (2023)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"Xu, J., Hong, C., Huang, J., Chen, L.Y., Decouchant, J.: AGIC: approximate gradient inversion attack on federated learning. In: 41st International Symposium on Reliable Distributed Systems, SRDS 2022, Vienna, Austria, 19\u201322 September 2022, pp. 12\u201322. IEEE (2022)","DOI":"10.1109\/SRDS55811.2022.00012"},{"key":"19_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-030-58595-2_20","volume-title":"Computer Vision \u2013 ECCV 2020","author":"X Ye","year":"2020","unstructured":"Ye, X., et al.: Accelerating CNN training by pruning activation gradients. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12370, pp. 322\u2013338. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58595-2_20"},{"key":"19_CR36","doi-asserted-by":"crossref","unstructured":"Yin, H., Mallya, A., Vahdat, A., \u00c1lvarez, J.M., Kautz, J., Molchanov, P.: See through gradients: image batch recovery via Gradinversion. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2021, Virtual, 19\u201325 June 2021, pp. 16337\u201316346. Computer Vision Foundation\/IEEE (2021)","DOI":"10.1109\/CVPR46437.2021.01607"},{"key":"19_CR37","unstructured":"Yu, F., Zhang, Y., Song, S., Seff, A., Xiao, J.: LSUN: construction of a large-scale image dataset using deep learning with humans in the loop. CoRR, abs\/1506.03365 (2015)"},{"key":"19_CR38","unstructured":"Zhang, H., Ciss\u00e9, M., Dauphin, Y.N., Lopez-Paz., D.: mixup: beyond empirical risk minimization. In: 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, 30 April\u20133 May 2018, Conference Track Proceedings. OpenReview.net (2018)"},{"key":"19_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric. In: 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2018, Salt Lake City, UT, USA, 18\u201322 June 2018, pp. 586\u2013595. Computer Vision Foundation\/IEEE Computer Society (2018)","DOI":"10.1109\/CVPR.2018.00068"},{"key":"19_CR40","unstructured":"Zhao, B., Mopuri, K.R., Bilen, H.: iDLG: improved deep leakage from gradients. CoRR, abs\/2001.02610 (2020)"},{"key":"19_CR41","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, 8\u201314 December 2019, Vancouver, BC, Canada, pp. 14747\u201314756 (2019)"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00624-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T19:44:17Z","timestamp":1757360657000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00624-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006233","9783032006240"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00624-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}