{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:29:22Z","timestamp":1760711362531,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T00:00:00Z","timestamp":1715212800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T00:00:00Z","timestamp":1715212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"R &D Program of Beijing Municipal Education Commission","award":["KM202210005028"],"award-info":[{"award-number":["KM202210005028"]}]},{"name":"Major Research Plan of National Natural Science Foundation of China","award":["92167102"],"award-info":[{"award-number":["92167102"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302020"],"award-info":[{"award-number":["62302020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key R &D Program of China","doi-asserted-by":"crossref","award":["2022YFB3103100"],"award-info":[{"award-number":["2022YFB3103100"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s00521-024-09870-0","type":"journal-article","created":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T15:01:57Z","timestamp":1715266917000},"page":"14661-14672","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Batch data recovery from gradients based on generative adversarial networks"],"prefix":"10.1007","volume":"36","author":[{"given":"Yunbo","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6414-9697","authenticated-orcid":false,"given":"Yuwen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9-Fern\u00e1n","family":"Mart\u00ed\u00adnez-Ortega","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3761-9598","authenticated-orcid":false,"given":"Haiyang","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6058-0217","authenticated-orcid":false,"given":"Zhen","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,9]]},"reference":[{"key":"9870_CR1","doi-asserted-by":"crossref","unstructured":"Cai Y, Yao Z, Dong Z, Gholami A, Mahoney MW, Keutzer K (2020) Zeroq: a novel zero shot quantization framework. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 13169\u201313178","DOI":"10.1109\/CVPR42600.2020.01318"},{"key":"9870_CR2","unstructured":"Chintala S (2021). soumith\/dcgan.torch. https:\/\/github.com\/soumith\/dcgan.torch. original-date: 2015-12-02T02:52:08Z"},{"key":"9870_CR3","unstructured":"Dean J, Corrado G, Monga R, Chen K, Devin M, Mao M, Aurelio Ranzato M, Senior A, Tucker P, Yang K, Le Q, Ng A (2012) Large scale distributed deep networks. In: Advances in neural information processing systems, Curran Associates, Inc"},{"key":"9870_CR4","doi-asserted-by":"crossref","unstructured":"Fredrikson M, Jha S, Ristenpart T (2015) Model inversion attacks that exploit confidence information and basic countermeasures, In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 1322\u20131333","DOI":"10.1145\/2810103.2813677"},{"key":"9870_CR5","unstructured":"Geiping J, Bauermeister H, Dr\u00f6ge H, Moeller M (2020) Inverting gradients - how easy is it to break privacy in federated learning?. In: Larochelle H, Ranzato M, Hadsell R, Balcan MF, Lin H (eds) Advances in neural information processing systems, Curran Associates, Inc. pp 16937\u201316947"},{"key":"9870_CR6","unstructured":"Goodfellow I.J, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial networks. arXiv:1406.2661 [cs, stat]"},{"key":"9870_CR7","unstructured":"Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville A, (2017) Improved training of wasserstein gans. In: Proceedings of the 31st international conference on neural information processing systems, Curran Associates Inc., Red Hook, NY, USA. pp 5769\u20135779"},{"key":"9870_CR8","doi-asserted-by":"crossref","unstructured":"Hayes J, Melis L, Danezis G, De\u00a0Cristofaro E (2019) Logan: membership inference attacks against generative models. In: Proceedings on privacy enhancing technologies (PoPETs), De Gruyter. pp 133\u2013152","DOI":"10.2478\/popets-2019-0008"},{"key":"9870_CR9","doi-asserted-by":"crossref","unstructured":"He Z, Zhang T, Lee RB (2019) Model inversion attacks against collaborative inference. In: Proceedings of the 35th annual computer security applications conference, pp 148\u2013162","DOI":"10.1145\/3359789.3359824"},{"key":"9870_CR10","doi-asserted-by":"publisher","unstructured":"Hitaj B, Ateniese G, Perez-Cruz F (2017). Deep models under the GAN: information leakage from collaborative deep learning, In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, ACM, Dallas Texas USA. pp 603\u2013618. https:\/\/doi.org\/10.1145\/3133956.3134012","DOI":"10.1145\/3133956.3134012"},{"key":"9870_CR11","unstructured":"Jeon J, Kim j, Lee K, Oh S, Ok J (2021) Gradient inversion with generative image prior. In: Advances in neural information processing systems, Curran Associates, Inc. pp 29898\u201329908"},{"key":"9870_CR12","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aittala M, Hellsten J, Lehtinen J, Aila T (2020). Analyzing and improving the image quality of stylegan. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 8110\u20138119","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"9870_CR13","doi-asserted-by":"publisher","unstructured":"Keuper J, Preundt FJ (2016) Distributed training of deep neural networks: theoretical and practical limits of parallel scalability. In: 2016 2nd workshop on machine learning in HPC environments (MLHPC), pp 19\u201326. https:\/\/doi.org\/10.1109\/MLHPC.2016.006","DOI":"10.1109\/MLHPC.2016.006"},{"key":"9870_CR14","unstructured":"Kone\u010dn\u1ef3 J, McMahan HB, Yu FX, Richt\u00e1rik P, Suresh AT, Bacon D, (2016) Federated learning: strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492"},{"key":"9870_CR15","unstructured":"Long Y, Bindschaedler V, Wang L, Bu D, Wang X, Tang H, Gunter CA, Chen K (2018). Understanding Membership Inferences on Well-Generalized Learning Models. arXiv:1802.04889 [cs, stat]"},{"key":"9870_CR16","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y\u00a0Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, PMLR. pp 1273\u20131282"},{"key":"9870_CR17","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y\u00a0Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, PMLR. pp 1273\u20131282"},{"key":"9870_CR18","doi-asserted-by":"crossref","unstructured":"Melis L, Song C, De\u00a0Cristofaro E, Shmatikov V (2019) Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE symposium on security and privacy (SP), IEEE. pp 691\u2013706","DOI":"10.1109\/SP.2019.00029"},{"key":"9870_CR19","unstructured":"Miyato T, Kataoka T, Koyama M, Yoshida Y (2018) Spectral normalization for generative adversarial networks. arXiv preprint arXiv:1802.05957"},{"key":"9870_CR20","unstructured":"Mordvintsev A, Olah C, Tyka M (2015) Inceptionism: going deeper into neural networks. Google AI Blog"},{"key":"9870_CR21","doi-asserted-by":"publisher","unstructured":"Nasr M, Shokri R, Houmansadr A (2019) Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning, In: 2019 IEEE symposium on security and privacy (SP), IEEE, San Francisco, CA, USA. pp 739\u2013753. https:\/\/doi.org\/10.1109\/SP.2019.00065","DOI":"10.1109\/SP.2019.00065"},{"key":"9870_CR22","doi-asserted-by":"crossref","unstructured":"Nguyen A, Clune J, Bengio Y, Dosovitskiy A, Yosinski J (2017) Plug and play generative networks: conditional iterative generation of images in latent space. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4467\u20134477","DOI":"10.1109\/CVPR.2017.374"},{"key":"9870_CR23","unstructured":"Radford A, Metz L, Chintala S (2016) Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv:1511.06434 [cs]"},{"key":"9870_CR24","doi-asserted-by":"crossref","unstructured":"Salem A, Zhang Y, Humbert M, Berrang P, Fritz M, Backes M (2018) ML-leaks: model and data independent membership inference attacks and defenses on machine learning models. arXiv:1806.01246 [Cs]","DOI":"10.14722\/ndss.2019.23119"},{"key":"9870_CR25","volume-title":"Image synthesis with a single (robust) classifier","author":"S Santurkar","year":"2019","unstructured":"Santurkar S, Tsipras D, Tran B, Ilyas A, Engstrom L, M\u0105dry A (2019) Image synthesis with a single (robust) classifier. Curran Associates Inc., Red Hook"},{"key":"9870_CR26","doi-asserted-by":"publisher","unstructured":"Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security - CCS \u201915, ACM Press, Denver, Colorado, USA. pp 1310\u20131321. https:\/\/doi.org\/10.1145\/2810103.2813687","DOI":"10.1145\/2810103.2813687"},{"key":"9870_CR27","doi-asserted-by":"crossref","unstructured":"Shokri R, Stronati M, Song C, Shmatikov V (2017) Membership inference attacks against machine learning models. In: 2017 IEEE symposium on security and privacy (SP), IEEE, pp 3\u201318","DOI":"10.1109\/SP.2017.41"},{"key":"9870_CR28","doi-asserted-by":"publisher","unstructured":"Strom N (2015) Scalable distributed DNN training using commodity GPU cloud computing. In: Interspeech 2015, ISCA, pp 1488\u20131492. https:\/\/doi.org\/10.21437\/Interspeech.2015-354","DOI":"10.21437\/Interspeech.2015-354"},{"key":"9870_CR29","doi-asserted-by":"publisher","unstructured":"Wang Z, Song M, Zhang Z, Song Y, Wang Q, Qi H (2019) Beyond inferring class representatives: user-level privacy leakage from federated learning. In: IEEE INFOCOM 2019 - IEEE conference on computer communications, IEEE, Paris, France. pp 2512\u20132520. https:\/\/doi.org\/10.1109\/INFOCOM.2019.8737416","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"9870_CR30","doi-asserted-by":"crossref","unstructured":"Wang Z, Song M, Zhang Z, Song Y, Wang Q, Qi H (2019) Beyond inferring class representatives: user-level privacy leakage from federated learning. In: IEEE INFOCOM 2019-IEEE conference on computer communications, IEEE. pp 2512\u20132520","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"9870_CR31","unstructured":"Wei W, Liu L, Loper M, Chow KH, Gursoy ME, Truex S, Wu Y (2020) A framework for evaluating gradient leakage attacks in federated learning. arXiv:2004.10397 [cs, stat]"},{"key":"9870_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3339474","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. ACM Trans Intell Syst Technol (TIST) 10:1\u201319","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"key":"9870_CR33","unstructured":"Yang Z, Chang EC, Liang Z (2019) Adversarial neural network inversion via auxiliary knowledge alignment. arXiv preprint arXiv:1902.08552"},{"key":"9870_CR34","doi-asserted-by":"crossref","unstructured":"Yin H, Mallya A, Vahdat A, Alvarez JM, Kautz J, Molchanov P (2021) See through gradients: image batch recovery via gradinversion. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 16337\u201316346","DOI":"10.1109\/CVPR46437.2021.01607"},{"key":"9870_CR35","doi-asserted-by":"publisher","unstructured":"Yin H, Molchanov P, Alvarez JM, Li Z, Mallya A, Hoiem D, Jha NK, Kautz J (2020) Dreaming to distill: data-free knowledge transfer via DeepInversion. In: 2020 IEEE\/CVF conference on computer vision and pattern recognition (CVPR), IEEE, Seattle, WA, USA. pp 8712\u20138721. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00874","DOI":"10.1109\/CVPR42600.2020.00874"},{"key":"9870_CR36","unstructured":"Zhang H, Goodfellow I, Metaxas D, Odena A (2019) Self-attention generative adversarial networks. In: International conference on machine learning, PMLR. pp 7354\u20137363"},{"key":"9870_CR37","doi-asserted-by":"crossref","unstructured":"Zhang Y, Jia R, Pei H, Wang W, Li B, Song D (2020) The secret revealer: generative model-inversion attacks against deep neural networks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 253\u2013261","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"9870_CR38","unstructured":"Zhao B, Mopuri KR, Bilen H (2020). iDLG: improved deep leakage from gradients. arXiv:2001.02610 [cs, stat]"},{"key":"9870_CR39","unstructured":"Zhao Y, Li M, Lai L, Suda N, Civin D, Chandra V (2018) Federated learning with non-iid data. arXiv preprint arXiv:1806.00582"},{"key":"9870_CR40","volume-title":"Advances in neural information processing systems","author":"L Zhu","year":"2019","unstructured":"Zhu L, Liu Z, Han S (2019) Deep leakage from gradients. In: Wallach H, Larochelle H, Beygelzimer A, d\u2019Alch\u00e9-Buc F, Fox E, Garnett R (eds) Advances in neural information processing systems. Curran Associates Inc"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-09870-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-09870-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-09870-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T10:04:46Z","timestamp":1724148286000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-09870-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,9]]},"references-count":40,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["9870"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-09870-0","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2024,5,9]]},"assertion":[{"value":"6 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights statement"}}]}}