{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T01:00:14Z","timestamp":1760576414648,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_30","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:18:02Z","timestamp":1760555882000},"page":"474-484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight Data Leakage Defense Mechanism for\u00a0Federated Learning Based on\u00a0Stochastic Gradient Masking"],"prefix":"10.1007","author":[{"given":"Xuezhi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Fuan","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Zhenxin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"30_CR1","unstructured":"Athalye, A., Carlini, N., Wagner, D.: Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. In: International Conference on Machine Learning, pp. 274\u2013283. PMLR (2018)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Boenisch, F., Dziedzic, A., Schuster, R., Shamsabadi, A.S., Shumailov, I., Papernot, N.: When the curious abandon honesty: federated learning is not private. In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS &P), pp. 175\u2013199. IEEE (2023)","DOI":"10.1109\/EuroSP57164.2023.00020"},{"key":"30_CR3","unstructured":"Bonawitz, K., et al.: Practical secure aggregation for federated learning on user-held data. arXiv preprint: arXiv:1611.04482 (2016)"},{"key":"30_CR4","unstructured":"Dai, X., et al.: Hyper-sphere quantization: communication-efficient SGD for federated learning. arXiv preprint: arXiv:1911.04655 (2019)"},{"key":"30_CR5","unstructured":"Dean, J., et\u00a0al.: Large scale distributed deep networks. In: Advances in Neural Information Processing Systems, vol. 25 (2012)"},{"key":"30_CR6","unstructured":"Du, J., et al.: SoK: on gradient leakage in federated learning. arXiv preprint: arXiv:2404.05403 (2024)"},{"key":"30_CR7","unstructured":"Du, J., Li, S., Chen, X., Chen, S., Hong, M.: Dynamic differential-privacy preserving SGD. arXiv preprint: arXiv:2111.00173 (2021)"},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"102199","DOI":"10.1016\/j.cose.2021.102199","volume":"103","author":"C Fang","year":"2021","unstructured":"Fang, C., Guo, Y., Hu, Y., Ma, B., Feng, L., Yin, A.: Privacy-preserving and communication-efficient federated learning in internet of things. Comput. Secur. 103, 102199 (2021)","journal-title":"Comput. Secur."},{"issue":"3","key":"30_CR9","first-page":"265","volume":"59","author":"W Feller","year":"1971","unstructured":"Feller, W.: An introduction to probability theory and its applications ii. Am. Math. Mon. 59(3), 265 (1971)","journal-title":"Am. Math. Mon."},{"key":"30_CR10","unstructured":"Gao, Y., Xie, Y., Deng, H., Zhu, Z.: Gradient inversion attack in federated learning: exposing text data through discrete optimization. In: Proceedings of the 31st International Conference on Computational Linguistics, pp. 2582\u20132591 (2025)"},{"key":"30_CR11","unstructured":"Geiping, J., Bauermeister, H., Dr\u00f6ge, H., Moeller, M.: Inverting gradients-how easy is it to break privacy in federated learning? In: Advances in Neural Information Processing Systems, vol. 33, pp. 16937\u201316947 (2020)"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Hong, H.G., Cho, Y., Cho, H., Ahn, J., Kim, J.: Foreseeing reconstruction quality of gradient inversion: an optimization perspective. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a038, pp. 12473\u201312481 (2024)","DOI":"10.1609\/aaai.v38i11.29140"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Hu, R., Gong, Y., Guo, Y.: Federated learning with sparsification-amplified privacy and adaptive optimization. arXiv preprint: arXiv:2008.01558 (2020)","DOI":"10.24963\/ijcai.2021\/202"},{"key":"30_CR14","unstructured":"Huang, Y., Gupta, S., Song, Z., Li, K., Arora, S.: Evaluating gradient inversion attacks and defenses in federated learning. In: Advances in Neural Information Processing Systems, vol. 34, pp. 7232\u20137241 (2021)"},{"key":"30_CR15","unstructured":"Jin, W., et al.: FedML-HE: an efficient homomorphic-encryption-based privacy-preserving federated learning system. arXiv preprint: arXiv:2303.10837 (2023)"},{"key":"30_CR16","unstructured":"Kairouz, P., et\u00a0al.: Advances and open problems in federated learning. Found. Trends\u00ae Mach. Learn. 14(1\u20132), 1\u2013210 (2021)"},{"key":"30_CR17","unstructured":"Kim, J., Park, S.: Random gradient masking as a defensive measure to deep leakage in federated learning. arXiv preprint: arXiv:2408.08430 (2024)"},{"key":"30_CR18","unstructured":"Li, X., Huang, K., Yang, W., Wang, S., Zhang, Z.: On the convergence of FedAvg on Non-IID data. arXiv preprint: arXiv:1907.02189 (2019)"},{"key":"30_CR19","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273\u20131282. PMLR (2017)"},{"key":"30_CR20","unstructured":"Ovi, P.R., Dey, E., Roy, N., Gangopadhyay, A.: Mixed precision quantization to tackle gradient leakage attacks in federated learning. arXiv preprint: arXiv:2210.13457 (2022)"},{"key":"30_CR21","unstructured":"Ren, H., Deng, J., Xie, X., Ma, X., Ma, J.: Gradient leakage defense with key-lock module for federated learning. arXiv preprint: arXiv:2305.04095 (2023)"},{"issue":"5","key":"30_CR22","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1109\/LWC.2022.3149783","volume":"11","author":"D Wen","year":"2022","unstructured":"Wen, D., Jeon, K.J., Huang, K.: Federated dropout\u2013a simple approach for enabling federated learning on resource constrained devices. IEEE Wirel. Commun. Lett. 11(5), 923\u2013927 (2022)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"30_CR23","doi-asserted-by":"crossref","unstructured":"Xu, J., Hong, C., Huang, J., Chen, L.Y., Decouchant, J.: AGIC: approximate gradient inversion attack on federated learning. In: 2022 41st International Symposium on Reliable Distributed Systems (SRDS), pp. 12\u201322. IEEE (2022)","DOI":"10.1109\/SRDS55811.2022.00012"},{"key":"30_CR24","unstructured":"Yue, K., Jin, R., Wong, C.W., Baron, D., Dai, H.: Gradient obfuscation gives a false sense of security in federated learning. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 6381\u20136398 (2023)"},{"key":"30_CR25","unstructured":"Zhang, X., Chen, X., Hong, M., Wu, Z.S., Yi, J.: Understanding clipping for federated learning: Convergence and client-level differential privacy. In: International Conference on Machine Learning, ICML 2022 (2022)"},{"key":"30_CR26","doi-asserted-by":"publisher","first-page":"103039","DOI":"10.1016\/j.cose.2022.103039","volume":"125","author":"Z Zhang","year":"2023","unstructured":"Zhang, Z., Tianqing, Z., Ren, W., Xiong, P., Choo, K.K.R.: Preserving data privacy in federated learning through large gradient pruning. Comput. Secur. 125, 103039 (2023)","journal-title":"Comput. Secur."},{"key":"30_CR27","unstructured":"Zhu, J., Yao, R., Blaschko, M.B.: Surrogate model extension (SME): a fast and accurate weight update attack on federated learning. arXiv preprint: arXiv:2306.00127 (2023)"},{"key":"30_CR28","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"30_CR29","unstructured":"Zinkevich, M., Weimer, M., Li, L., Smola, A.: Parallelized stochastic gradient descent. In: Advances in Neural Information Processing Systems, vol. 23 (2010)"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:18:08Z","timestamp":1760555888000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}