{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T07:12:21Z","timestamp":1758438741548,"version":"3.44.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032051844"},{"type":"electronic","value":"9783032051851"}],"license":[{"start":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T00:00:00Z","timestamp":1758326400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T00:00:00Z","timestamp":1758326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05185-1_26","type":"book-chapter","created":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T23:46:21Z","timestamp":1758325581000},"page":"262-272","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["GradInvDiff: Stealing Medical Privacy in\u00a0Federated Learning via\u00a0Diffusion-Based Gradient Inversion"],"prefix":"10.1007","author":[{"given":"Zhiyuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Daisong","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Wenzhuo","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Yuliang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,20]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2020.105474","volume":"30","author":"A Acevedo","year":"2020","unstructured":"Acevedo, A., et al.: A Dataset of Microscopic Peripheral Blood Cell Images for Development of Automatic Recognition Systems. Data Brief 30, 105474 (2020)","journal-title":"Data Brief"},{"key":"26_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2022.102680","volume":"84","author":"P Bilic","year":"2023","unstructured":"Bilic, P., Christ, P., Li, H.B., Vorontsov, E., Ben-Cohen, A., Kaissis, G., Szeskin, A., Jacobs, C., Mamani, G.E.H., Chartrand, G., et al.: The Liver Tumor Segmentation Benchmark (LiTS). Med. Image Anal. 84, 102680 (2023)","journal-title":"Med. Image Anal."},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Blau Y, Michaeli T.: The perception-distortion tradeoff. In: Proceedings of the 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6228\u20136237. IEEE (2018) 10.1109\/CVPR.2018.00652","DOI":"10.1109\/CVPR.2018.00652"},{"key":"26_CR4","doi-asserted-by":"publisher","unstructured":"Boenisch, F., Dziedzic, A., Schuster, R., Shamsabadi, A. S., Shumailov, I., Papernot, N.: When the Curious Abandon Honesty: Federated Learning Is Not Private. In: Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy, pp. 175\u2013199. IEEE (2023) https:\/\/doi.org\/10.1109\/EuroSP57164.2023.00020","DOI":"10.1109\/EuroSP57164.2023.00020"},{"key":"26_CR5","unstructured":"Chen, H., Vikalo, H.: Recovering labels from local updates in federated learning. In: Proceedings of the 41st International Conference on Machine Learning, pp. 7346\u20137372. PMLR (2024)"},{"issue":"10","key":"26_CR6","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1038\/s41591-021-01506-3","volume":"27","author":"I Dayan","year":"2021","unstructured":"Dayan, I., Roth, H.R., et al.: Federated Learning for Predicting Clinical Outcomes in Patients with COVID-19. Nat. Med. 27(10), 1735\u20131743 (2021)","journal-title":"Nat. Med."},{"key":"26_CR7","unstructured":"Dhariwal P, Nichol A.: Diffusion Models Beat GANs on Image Synthesis. In: Proceedings of the 35th International Conference on Neural Information Processing Systems, pp. 8780\u20138794. Curran Associates Inc. (2021)"},{"issue":"7","key":"26_CR8","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1109\/TMI.2022.3220757","volume":"42","author":"G Elmas","year":"2022","unstructured":"Elmas, G., Dar, S.U.H., Korkmaz, Y., et al.: Federated Learning of Generative Image Priors for MRI Reconstruction. IEEE Trans. Med. Imaging 42(7), 1996\u20132009 (2022)","journal-title":"IEEE Trans. Med. Imaging"},{"key":"26_CR9","doi-asserted-by":"publisher","unstructured":"Fang, H., Chen, B., Wang, X., Wang, Z., Xia, S. T.: GIFD: A generative gradient inversion method with feature domain optimization. In: Proceedings of the 2023 IEEE\/CVF International Conference on Computer Vision, pp. 4967\u20144976. IEEE (2023) https:\/\/doi.org\/10.1109\/ICCV51070.2023.00458","DOI":"10.1109\/ICCV51070.2023.00458"},{"key":"26_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107330","volume":"106","author":"I Feki","year":"2021","unstructured":"Feki, I., Ammar, S., Kessentini, Y., et al.: Federated Learning for COVID-19 Screening from Chest X-ray Images. Appl. Soft Comput. 106, 107330 (2021)","journal-title":"Appl. Soft Comput."},{"key":"26_CR11","unstructured":"Fowl, L. H., Geiping, J., Czaja, W., Goldblum, M., Goldstein, T.: Robbing the Fed: Directly Obtaining Private Data in Federated Learning with Modified Models. In: Proceedings of the 2022 International Conference on Learning Representations, pp. 1\u201315 OpenReview (2022)"},{"key":"26_CR12","unstructured":"Geiping, J., Bauermeister, H., Dr\u00f6ge, H., et al.: Inverting gradients - how easy is it to break privacy in federated learning? In: Proceedings of the 34th International Conference on Neural Information Processing Systems, pp. 16937\u201316947. Curran Associates Inc. (2020)"},{"key":"26_CR13","doi-asserted-by":"publisher","unstructured":"Gu, H., Zhang, X., Li, J., et al.: Federated learning vulnerabilities: Privacy attacks with denoising diffusion probabilistic models. In: Proceedings of the ACM Web Conference 2024, pp. 1149\u20131157. ACM (2024) https:\/\/doi.org\/10.1145\/3589334.3645514","DOI":"10.1145\/3589334.3645514"},{"key":"26_CR14","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. In: Proceedings of the 34th International Conference on Neural Information Processing Systems, pp. 574\u2013585. Curran Associates Inc. (2020)"},{"key":"26_CR15","unstructured":"Huang, Y., Gupta, S., Song, Z., Li, K., Arora, S.: Evaluating gradient inversion attacks and defenses in federated learning. In: Proceedings of the 35th International Conference on Neural Information Processing Systems, pp. 7232\u20137241. Curran Associates Inc. (2021)"},{"key":"26_CR16","unstructured":"Jeon, J., Lee, K., Oh, S., Ok, J., et al.: Gradient inversion with generative image prior. In: Proceedings of the 35th International Conference on Neural Information Processing Systems, pp. 29898-\u201329908. Curran Associates Inc. (2021)"},{"key":"26_CR17","doi-asserted-by":"publisher","unstructured":"Li, Z., Zhang, J., Liu, L., Liu, J.: Auditing privacy defenses in federated learning via generative gradient leakage. In: Proceedings of the 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10132\u201410142. IEEE (2022) https:\/\/doi.org\/10.1109\/CVPR52688.2022.00989","DOI":"10.1109\/CVPR52688.2022.00989"},{"key":"26_CR18","unstructured":"Nichol, A.Q., Dhariwal, P.: Improved denoising diffusion probabilistic models. In: Proceedings of the 38th International Conference on Machine Learning, pp. 8162\u20138171. PMLR (2021)"},{"issue":"1","key":"26_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41746-020-00323-1","volume":"3","author":"N Rieke","year":"2020","unstructured":"Rieke, N., Hancox, J., Li, W., Milletari, F., Roth, H.R., Albarqouni, S., Bakas, S., et al.: The Future of Digital Health with Federated Learning. NPJ Digital Medicine 3(1), 1\u20137 (2020)","journal-title":"NPJ Digital Medicine"},{"issue":"1","key":"26_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-69250-1","volume":"10","author":"MJ Sheller","year":"2020","unstructured":"Sheller, M.J., Edwards, B., Reina, G.A., Martin, J., Pati, S., et al.: Federated Learning in Medicine: Facilitating Multi-institutional Collaborations Without Sharing Patient Data. Sci. Rep. 10(1), 1\u201312 (2020)","journal-title":"Sci. Rep."},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"8693","DOI":"10.1109\/ACCESS.2022.3141913","volume":"10","author":"BC Tedeschini","year":"2022","unstructured":"Tedeschini, B.C., Savazzi, S., Stoklasa, R., et al.: Decentralized Federated Learning for Healthcare Networks: A Case Study on Tumor Segmentation. IEEE Access 10, 8693\u20138708 (2022)","journal-title":"IEEE Access"},{"key":"26_CR22","doi-asserted-by":"publisher","unstructured":"Wang, X., et al.: ChestX-ray8: Hospital-scale chest X-ray database and benchmarks on weakly-supervised classification and localization of common thorax diseases. In: Proceedings of the 2017 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3462\u20143471. IEEE (2017) https:\/\/doi.org\/10.1109\/CVPR.2017.369","DOI":"10.1109\/CVPR.2017.369"},{"issue":"4","key":"26_CR23","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image Quality Assessment: from Error Visibility to Structural Similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"26_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102620","volume":"113","author":"L Wu","year":"2025","unstructured":"Wu, L., Liu, Z., Pu, B., et al.: DGGI: Deep Generative Gradient Inversion with Diffusion Model. Information Fusion 113, 102620 (2025)","journal-title":"Information Fusion"},{"issue":"1","key":"26_CR25","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1038\/s41597-022-01721-8","volume":"10","author":"J Yang","year":"2023","unstructured":"Yang, J., Shi, R., Wei, D., Liu, Z., Zhao, L., Ke, B., Pfister, H., Ni, B.: MedMNIST V2-A Large-scale Lightweight Benchmark for 2D and 3D Biomedical Image Classification. Scientific Data 10(1), 41 (2023)","journal-title":"Scientific Data"},{"key":"26_CR26","unstructured":"Yang, L., Ding, S., Cai, Y., Yu, J., Wang, J., Shi, Y.: Guidance with Spherical Gaussian Constraint for Conditional Diffusion. In: Proceedings of the 41st International Conference on Machine Learning, pp. 56071\u201356095. JMLR (2024)"},{"key":"26_CR27","doi-asserted-by":"publisher","unstructured":"Zhang, R., Guo, S., Wang, J., Xie, X., Tao, D.: A survey on gradient inversion: attacks, defenses and future directions. In: Proceedings of the 31st International Joint Conference on Artificial Intelligence, pp. 5678\u20135685. International Joint Conferences on Artificial Intelligence Organization (2022) https:\/\/doi.org\/10.24963\/ijcai.2022\/791","DOI":"10.24963\/ijcai.2022\/791"},{"key":"26_CR28","doi-asserted-by":"publisher","unstructured":"Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The Unreasonable Effectiveness of Deep Features as a Perceptual Metric. In: Proceedings of the 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 586\u2013595. IEEE (2018) https:\/\/doi.org\/10.1109\/CVPR.2018.00068","DOI":"10.1109\/CVPR.2018.00068"},{"key":"26_CR29","doi-asserted-by":"publisher","unstructured":"Zhao, B., Mopuri, K. R., Bilen, H.: IDLG: Improved deep leakage from gradients. arXiv preprint (2020) https:\/\/doi.org\/10.48550\/arXiv.2001.02610","DOI":"10.48550\/arXiv.2001.02610"},{"key":"26_CR30","doi-asserted-by":"publisher","unstructured":"Zhao, J. C., Sharma, A., Elkordy, A. R., Ezzeldin, Y. H., Avestimehr, S., Bagchi, S.: Loki: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation. In: Proceedings of the 2024 IEEE Symposium on Security and Privacy, pp. 1287\u20131305. IEEE (2024) https:\/\/doi.org\/10.1109\/SP54263.2024.00030","DOI":"10.1109\/SP54263.2024.00030"},{"key":"26_CR31","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Proceedings of the 33rd International Conference on Neural Information Processing Systems, pp. 14774\u201314784. Curran Associates Inc. (2019)"}],"container-title":["Lecture Notes in Computer Science","Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05185-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T23:46:28Z","timestamp":1758325588000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05185-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,20]]},"ISBN":["9783032051844","9783032051851"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05185-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,9,20]]},"assertion":[{"value":"20 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"MICCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Medical Image Computing and Computer-Assisted Intervention","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Daejeon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"miccai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.miccai.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}