{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:48:19Z","timestamp":1775231299212,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819691005","type":"print"},{"value":"9789819691012","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9101-2_9","type":"book-chapter","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:49:58Z","timestamp":1752140998000},"page":"167-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DeGain: Detecting GAN-Based Data Inversion in\u00a0Collaborative Deep Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6094-5995","authenticated-orcid":false,"given":"Zhenzhu","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6029-5064","authenticated-orcid":false,"given":"Yansong","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1632-5737","authenticated-orcid":false,"given":"Anmin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Fanjian","family":"Zeng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5903-557X","authenticated-orcid":false,"given":"Boyu","family":"Kuang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3491-8146","authenticated-orcid":false,"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,7]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K., Zhang, L.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"issue":"1","key":"9_CR2","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1109\/TII.2020.3046648","volume":"18","author":"H Chen","year":"2020","unstructured":"Chen, H., et al.: Practical membership inference attack against collaborative inference in industrial IoT. IEEE Trans. Ind. Inf. 18(1), 477\u2013487 (2020)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"7","key":"9_CR3","doi-asserted-by":"publisher","first-page":"5839","DOI":"10.1109\/JIOT.2020.3033171","volume":"8","author":"Z Chen","year":"2021","unstructured":"Chen, Z., Fu, A., Zhang, Y., Liu, Z., Zeng, F., Deng, R.H.: Secure collaborative deep learning against gan attacks in the internet of things. IEEE Internet Things J. 8(7), 5839\u20135849 (2021)","journal-title":"IEEE Internet Things J."},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"2000","DOI":"10.1109\/TIFS.2022.3175616","volume":"17","author":"Z Chen","year":"2022","unstructured":"Chen, Z., Wang, S., Fu, A., Gao, Y., Yu, S., Deng, R.H.: Linkbreaker: breaking the backdoor-trigger link in dnns via neurons consistency check. IEEE Trans. Inf. Forensics Secur. 17, 2000\u20132014 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"9_CR5","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/TSC.2019.2937484","volume":"15","author":"A Fu","year":"2022","unstructured":"Fu, A., Chen, Z., Mu, Y., Susilo, W., Sun, Y., Wu, J.: Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization. IEEE Trans. Serv. Comput. 15(1), 266\u2013278 (2022)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"9_CR6","unstructured":"Fung, C., Yoon, C.J., Beschastnikh, I.: Mitigating sybils in federated learning poisoning. arXiv preprint arXiv:1808.04866 (2018)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Ganju, K., Wang, Q., Yang, W., Gunter, C.A., Borisov, N.: Property inference attacks on fully connected neural networks using permutation invariant representations. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 619\u2013633 (2018)","DOI":"10.1145\/3243734.3243834"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"He, Z., Zhang, T., Lee, R.B.: Model inversion attacks against collaborative inference. In: Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC), pp. 148\u2013162 (2019)","DOI":"10.1145\/3359789.3359824"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Ateniese, G., Perez-Cruz, F.: Deep models under the GAN: information leakage from collaborative deep learning. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 603\u2013618 (2017)","DOI":"10.1145\/3133956.3134012"},{"key":"9_CR10","doi-asserted-by":"publisher","DOI":"10.1145\/3523273","author":"H Hu","year":"2022","unstructured":"Hu, H., Salcic, Z., Sun, L., Dobbie, G., Yu, P.S., Zhang, X.: Membership inference attacks on machine learning: a survey. ACM Comput. Surv. (CSUR) (2022). https:\/\/doi.org\/10.1145\/3523273","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"9_CR11","unstructured":"Jiang, L., Lou, X., Tan, R., Zhao, J.: Differentially private collaborative learning for the iot edge. In: Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN), pp. 341\u2013346 (2019)"},{"issue":"11","key":"9_CR12","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P., et al.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"issue":"6","key":"9_CR13","doi-asserted-by":"publisher","first-page":"2969","DOI":"10.1109\/TDSC.2020.2971598","volume":"18","author":"T Li","year":"2021","unstructured":"Li, T., Li, J., Chen, X., Liu, Z., Lou, W., Hou, Y.T.: NPMML: a framework for non-interactive privacy-preserving multi-party machine learning. IEEE Trans. Dependable Secure Comput. 18(6), 2969\u20132982 (2021). https:\/\/doi.org\/10.1109\/TDSC.2020.2971598","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Luo, X., Wu, Y., Xiao, X., Ooi, B.C.: Feature inference attack on model predictions in vertical federated learning. In: Proceedings of IEEE 37th International Conference on Data Engineering (ICDE), pp. 181\u2013192. IEEE (2021)","DOI":"10.1109\/ICDE51399.2021.00023"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.ins.2018.05.005","volume":"459","author":"X Ma","year":"2018","unstructured":"Ma, X., Zhang, F., Chen, X., Shen, J.: Privacy preserving multi-party computation delegation for deep learning in cloud computing. Inf. Sci. 459, 103\u2013116 (2018)","journal-title":"Inf. Sci."},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Melis, L., Song, C., De\u00a0Cristofaro, E., Shmatikov, V.: Exploiting unintended feature leakage in collaborative learning. In: Proceedings of IEEE Symposium on Security and Privacy (S &P), pp. 691\u2013706 (2019)","DOI":"10.1109\/SP.2019.00029"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2020.10.007","volume":"115","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri, V., Parizi, R.M., Pouriyeh, S., Huang, Y., Dehghantanha, A., Srivastava, G.: A survey on security and privacy of federated learning. Futur. Gener. Comput. Syst. 115, 619\u2013640 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In: Proceedings of IEEE Symposium on Security and Privacy (S &P), pp. 739\u2013753 (2019)","DOI":"10.1109\/SP.2019.00065"},{"key":"9_CR19","unstructured":"Pan, X., Zhang, M., Wu, D., Xiao, Q., Ji, S., Yang, M.: Justinian\u2019s gaavernor: robust distributed learning with gradient aggregation agent. In: Proceedings of USENIX Security Symposium (2020)"},{"issue":"5","key":"9_CR20","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","volume":"13","author":"LT Phong","year":"2018","unstructured":"Phong, L.T., Aono, Y., Hayashi, T., Wang, L., Moriai, S.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333\u20131345 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"9_CR21","doi-asserted-by":"publisher","first-page":"3003","DOI":"10.1109\/TIFS.2019.2911169","volume":"14","author":"LT Phong","year":"2019","unstructured":"Phong, L.T., Phuong, T.T.: Privacy-preserving deep learning via weight transmission. IEEE Trans. Inf. Forensics Secur. 14(11), 3003\u20133015 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR22","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Samaria, F.S., Harter, A.C.: Parameterisation of a stochastic model for human face identification. In: IEEE WACA, pp. 138\u2013142 (1994)","DOI":"10.1109\/ACV.1994.341300"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Sariyildiz, M.B., Cinbis, R.G., Ayday, E.: Key protected classification for collaborative learning. Pattern Recogn., 107327 (2020)","DOI":"10.1016\/j.patcog.2020.107327"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: Proceedings of IEEE Symposium on Security and Privacy (S &P), pp. 3\u201318 (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"9_CR26","doi-asserted-by":"publisher","unstructured":"Wu, G., Wang, H., Zhang, H., Zhao, Y., Yu, S., Shen, S.: Computation offloading method using stochastic games for software defined network-based multi-agent mobile edge computing. IEEE Internet Things J. (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3277541","DOI":"10.1109\/JIOT.2023.3277541"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Xu, M., Li, X.: Subject property inference attack in collaborative learning. In: Proceedings of International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), vol.\u00a01, pp. 227\u2013231. IEEE (2020)","DOI":"10.1109\/IHMSC49165.2020.00057"},{"key":"9_CR28","unstructured":"Zhang, C., Li, S., Xia, J., Wang, W., Yan, F., Liu, Y.: BatchCrypt: efficient homomorphic encryption for Cross-Silo federated learning. In: 2020 USENIX Annual Technical Conference (USENIX ATC), pp. 493\u2013506 (2020)"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, C., et al.: PPA: preference profiling attack against federated learning. In: The Network and Distributed System Security Symposium (NDSS), pp. 1\u201316 (2023)","DOI":"10.14722\/ndss.2023.23171"},{"key":"9_CR30","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Advances in Neural Information Processing Systems (NeurlIPS), vol.\u00a032, pp. 1\u201311 (2019)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9101-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T14:55:00Z","timestamp":1775228100000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9101-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819691005","9789819691012"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9101-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACISP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Conference on Information Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wollongong, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acisp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/uow-ic2.github.io\/acisp2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}