{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T10:44:59Z","timestamp":1750675499591},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T00:00:00Z","timestamp":1677715200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T00:00:00Z","timestamp":1677715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Major Research Plan of National Natural Science Foundation of China","award":["92167102","92167102"],"award-info":[{"award-number":["92167102","92167102"]}]},{"name":"Major Research Plan of National Natural Science Foundation of China","award":["92167102","92167102"],"award-info":[{"award-number":["92167102","92167102"]}]},{"name":"R &D Program of Beijing Municipal Education Commission","award":["KM202210005028","KM202210005028"],"award-info":[{"award-number":["KM202210005028","KM202210005028"]}]},{"name":"R &D Program of Beijing Municipal Education Commission","award":["KM202210005028","KM202210005028"],"award-info":[{"award-number":["KM202210005028","KM202210005028"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s10207-023-00670-6","type":"journal-article","created":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T03:03:05Z","timestamp":1677726185000},"page":"919-930","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["AAIA: an efficient aggregation scheme against inverting attack for federated learning"],"prefix":"10.1007","volume":"22","author":[{"given":"Zhen","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shisong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yunbo","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9-Fern\u00e1n","family":"Mart\u00ednez","sequence":"additional","affiliation":[]},{"given":"Lourdes","family":"L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"Yuwen","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,2]]},"reference":[{"key":"670_CR1","unstructured":"Chen, J., Pan, X., Monga, R., Bengio, S., Jozefowicz, R.: Revisiting distributed synchronous SGD, arXiv:1604.00981 [cs], (Mar. 2017). [Online]"},{"key":"670_CR2","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.\u00a0A.: \u201cCommunication-Efficient Learning of Deep Networks from Decentralized Data,\u201d in Proceedings of the 20th International Conference on Artificial Intelligence and Statistics.PMLR, (Apr. 2017), pp. 1273\u20131282"},{"key":"670_CR3","first-page":"429","volume":"2","author":"T Li","year":"2020","unstructured":"Li, T., Sahu, A.K., Zaheer, M., Sanjabi, M., Talwalkar, A., Smith, V.: Federated optimization in heterogeneous networks. Proceed. Mach. Learn. Sys. 2, 429\u2013450 (2020)","journal-title":"Proceed. Mach. Learn. Sys."},{"issue":"5","key":"670_CR4","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","volume":"13","author":"LT Phong","year":"2018","unstructured":"Phong, L.T., Aono, Y., Hayashi, T., Wang, L., Moriai, S.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Foren. Secur. 13(5), 1333\u20131345 (2018)","journal-title":"IEEE Trans. Inf. Foren. Secur."},{"key":"670_CR5","unstructured":"Zhu, L., Liu, Z., Han, S.:\u201cDeep leakage from gradients,\u201d in Advances in Neural Information Processing Systems, vol.\u00a032, (2019)"},{"key":"670_CR6","unstructured":"Zhao, B., Mopuri, K.\u00a0R., Bilen, H.: iDLG: improved deep leakage from gradients, arXiv:2001.02610 [cs, stat], (2020). [Online]"},{"key":"670_CR7","unstructured":"Wei, W., Liu, L., Loper, M., Chow, K.-H., Gursoy, M.\u00a0E., Truex, S., Wu, Y.:\u201cA Framework for Evaluating Gradient Leakage Attacks in Federated Learning,\u201d arXiv:2004.10397 [cs, stat], (Apr. 2020). [Online]"},{"key":"670_CR8","unstructured":"Jeon, J., Kim, j., Lee, K., Oh, S., Ok, J.:Gradient Inversion with Generative Image Prior, in Advances in neural information processing systems, vol.\u00a034. Curran Associates, Inc., (2021), pp. 29\u00a0898\u201329\u00a0908"},{"key":"670_CR9","unstructured":"Geiping, J., Bauermeister, H., Dr\u00f6ge, H., Moeller, M.: Inverting gradients \u2013 How easy is it to break privacy in federated learning? arXiv:2003.14053 [cs], (2020). [Online]"},{"key":"670_CR10","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Ateniese, G., Perez-Cruz, F.: Deep models under the GAN: information leakage from collaborative deep learning, arXiv:1702.07464 [cs, stat], (2017). [Online]","DOI":"10.1145\/3133956.3134012"},{"key":"670_CR11","doi-asserted-by":"publisher","unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H.\u00a0B., Patel, S., Ramage, D., Segal, A., Seth, K.: \u201cPractical Secure Aggregation for Privacy-Preserving Machine Learning,\u201d in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.Dallas Texas USA: ACM, (Oct. 2017), pp. 1175\u20131191. [Online]. https:\/\/doi.org\/10.1145\/3133956.3133982","DOI":"10.1145\/3133956.3133982"},{"key":"670_CR12","doi-asserted-by":"crossref","unstructured":"Duan, J., Zhou, J., Li, Y.: Privacy-Preserving distributed deep learning based on secret sharing, Information Sciences, vol. 527, pp. 108\u2013127, (2020). [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025520302553","DOI":"10.1016\/j.ins.2020.03.074"},{"key":"670_CR13","doi-asserted-by":"crossref","unstructured":"Yin, H., Mallya, A., Vahdat, A., Alvarez, J.\u00a0M., Kautz, J., Molchanov, P.: See through gradients: image batch recovery via GradInversion, in 2021 IEEE\/CVF Conference on computer vision and pattern recognition (CVPR). Nashville, TN, USA: IEEE, (2021), pp. 16\u00a0332\u201316\u00a0341","DOI":"10.1109\/CVPR46437.2021.01607"},{"key":"670_CR14","unstructured":"Fowl, L., Geiping, J., Czaja, W., Goldblum, M., Goldstein, T.: Robbing the fed: directly obtaining private data in federated learning with modified models,\u2019 (2022)"},{"key":"670_CR15","unstructured":"Boenisch, F., Dziedzic, A., Schuster, R., Shamsabadi, A.\u00a0S., Shumailov, I., Papernot, N.: When the curious abandon honesty: federated learning is not private,\u201d (2021)"},{"key":"670_CR16","unstructured":"Zhu, J., Blaschko, M.: R-GAP: recursive gradient attack on privacy (2021)"},{"key":"670_CR17","doi-asserted-by":"publisher","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning, in Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. Denver Colorado USA: ACM, (Oct. 2015), pp. 1310\u20131321. [Online]. Available: https:\/\/doi.org\/10.1145\/2810103.2813687","DOI":"10.1145\/2810103.2813687"},{"issue":"8","key":"670_CR18","doi-asserted-by":"publisher","first-page":"1262","DOI":"10.1002\/int.22241","volume":"35","author":"Q Zhao","year":"2020","unstructured":"Zhao, Q., Zhao, C., Cui, S., Jing, S., Chen, Z.: PrivateDL: privacy-preserving collaborative deep learning against leakage from gradient sharing. Int. J. Intell. Sys. 35(8), 1262\u20131279 (2020). https:\/\/doi.org\/10.1002\/int.22241","journal-title":"Int. J. Intell. Sys."},{"key":"670_CR19","unstructured":"Ryffel, T., Trask, A., Dahl, M., Wagner, B., Mancuso, J., Rueckert, D., Passerat-Palmbach, J.: \u201cA generic framework for privacy preserving deep learning,\u201d arXiv:1811.04017 [cs, stat], (Nov. 2018). [Online]"},{"key":"670_CR20","unstructured":"Zhao, L., Wang, Q., Zou, Q., Zhang, Y., Chen, Y.: Privacy-preserving collaborative deep learning with unreliable participants, arXiv:1812.10113 [cs], pp. 469\u2013472, (2019). [Online]. Available:"},{"key":"670_CR21","doi-asserted-by":"crossref","unstructured":"Gong, M., Pan, K., Xie, Y., Qin, A.\u00a0K., Tang, Z.: Preserving differential privacy in deep neural networks with relevance-based adaptive noise imposition, Neural Networks, vol. 125, pp. 131\u2013141, (2020). [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0893608020300460","DOI":"10.1016\/j.neunet.2020.02.001"},{"key":"670_CR22","doi-asserted-by":"publisher","unstructured":"Liu, X., Li, H., Xu, G., Lu, R., He, M.: Adaptive privacy-preserving federated learning,\u2019 Peer-to-peer networking and applications, (2020). [Online]. Available: https:\/\/doi.org\/10.1007\/s12083-019-00869-2","DOI":"10.1007\/s12083-019-00869-2"},{"issue":"7","key":"670_CR23","doi-asserted-by":"publisher","first-page":"4206","DOI":"10.1109\/TII.2019.2912465","volume":"15","author":"L Lyu","year":"2019","unstructured":"Lyu, L., Bezdek, J.C., He, X., Jin, J.: Fog-embedded deep learning for the internet of things. IEEE Trans. Ind. Inf. 15(7), 4206\u20134215 (2019)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"3","key":"670_CR24","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.1109\/TII.2019.2941244","volume":"16","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Chen, X., Liu, J.K., Xiang, Y.: DeepPAR and DeepDPA: privacy preserving and asynchronous deep learning for industrial IoT. IEEE Trans. Ind. Inf. 16(3), 2081\u20132090 (2020)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"670_CR25","unstructured":"Choi, B., Sohn, J.-y., Han, D.-J., Moon, J.: \u201cCommunication-Computation Efficient Secure Aggregation for Federated Learning,\u201d arXiv:2012.05433 [cs, math], (Dec. 2020)"},{"key":"670_CR26","doi-asserted-by":"crossref","unstructured":"So, J., Guler, B., Avestimehr, A.\u00a0S.: Turbo-aggregate: breaking the quadratic aggregation barrier in secure federated learning, arXiv:2002.04156 [cs, math, stat], (2020). [Online]","DOI":"10.1109\/JSAIT.2021.3054610"},{"key":"670_CR27","doi-asserted-by":"publisher","unstructured":"Bell, J.\u00a0H., Bonawitz, K.\u00a0A., Gasc\u00f3n, A., Lepoint, T., Raykova, M.: Secure single-server aggregation with (poly)logarithmic overhead, in Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, ser. CCS \u201920. New York, NY, USA: Association for computing machinery, (2020), pp. 1253\u20131269. [Online]. Available: https:\/\/doi.org\/10.1145\/3372297.3417885","DOI":"10.1145\/3372297.3417885"},{"key":"670_CR28","unstructured":"Fu, A., Zhang, X., Xiong, N., Gao, Y., Wang, H.: VFL: a verifiable federated learning with privacy-preserving for big data in industrial IoT, arXiv:2007.13585 [cs], (2020). [Online]"},{"key":"670_CR29","doi-asserted-by":"publisher","unstructured":"Xu, R., Baracaldo, N., Zhou, Y., Anwar, A., Ludwig, H.: HybridAlpha: an efficient approach for privacy-preserving federated learning, in Proceedings of the 12th ACM workshop on artificial intelligence and security, ser. AISec\u201919.New York, NY, USA: association for computing machinery, (2019), pp. 13\u201323. [Online]. Available: https:\/\/doi.org\/10.1145\/3338501.3357371","DOI":"10.1145\/3338501.3357371"},{"key":"670_CR30","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models, in 2017 IEEE symposium on security and privacy (SP), (2017), pp. 3\u201318","DOI":"10.1109\/SP.2017.41"},{"key":"670_CR31","doi-asserted-by":"crossref","unstructured":"Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. in: IEEE Symposium security privacy (SP), 739\u2013753 (2019)","DOI":"10.1109\/SP.2019.00065"},{"key":"670_CR32","doi-asserted-by":"crossref","unstructured":"Jagielski, M., Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., Li, B.: Manipulating machine learning: poisoning attacks and countermeasures for regression learning, in: IEEE Symposium on Security and Privacy (SP), pp. 19\u201335 (2018)","DOI":"10.1109\/SP.2018.00057"},{"key":"670_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, J., Chen, J., Wu, D., Chen, B., Yu, S.: \u201cPoisoning Attack in Federated Learning using Generative Adversarial Nets,\u201d in 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/13th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), (Aug. 2019), pp. 374\u2013380","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00057"},{"key":"670_CR34","doi-asserted-by":"crossref","unstructured":"Tan, T.\u00a0J.\u00a0L., Shokri, R.: Bypassing backdoor detection algorithms in deep learning, in 2020 IEEE European symposium on security and privacy (EuroS P), (2020), pp. 175\u2013183","DOI":"10.1109\/EuroSP48549.2020.00019"},{"key":"670_CR35","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V.: How to backdoor federated learning, in International Conference on Artificial Intelligence and Statistics. PMLR, (2020), pp. 2938\u20132948"},{"key":"670_CR36","doi-asserted-by":"crossref","unstructured":"Goodman, J.\u00a0T., Venolia, G.\u00a0D., Steury, K.\u00a0R., Parker, C.: \u201cLanguage modeling for soft keyboards,\u201d (2002)","DOI":"10.1145\/502716.502753"},{"key":"670_CR37","doi-asserted-by":"crossref","unstructured":"Barreto, P.\u00a0S. L.\u00a0M., Kim, H.\u00a0Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems, in Advances in Cryptology \u2014 CRYPTO 2002, M.\u00a0Yung, Ed.Berlin, Heidelberg: Springer, (2002), pp. 354\u2013369","DOI":"10.1007\/3-540-45708-9_23"},{"key":"670_CR38","doi-asserted-by":"crossref","unstructured":"Benaloh, J.\u00a0C.: Secret sharing homomorphisms: keeping shares of a secret secret (Extended Abstract), in Advances in cryptology \u2014 CRYPTO\u2019 86, ser. Lecture Notes in Computer Science, A.\u00a0M. Odlyzko, Ed. Berlin, Heidelberg: Springer, (1987), pp. 251\u2013260","DOI":"10.1007\/3-540-47721-7_19"},{"key":"670_CR39","unstructured":"Stevens, T., Skalka, C., Vincent, C., Ring, J., Clark, S., Near, J.: Efficient differentially private secure aggregation for federated learning via hardness of learning with errors, in Proceedings of the 31st USENIX Security Symposium. Boston, MA, USA: USENIX, (2022), pp. 1379\u20131395"},{"key":"670_CR40","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","volume":"15","author":"G Xu","year":"2020","unstructured":"Xu, G., Li, H., Liu, S., Yang, K., Lin, X.: VerifyNet: secure and verifiable federated learning. IEEE Trans. Inf. Foren. Secur. 15, 911\u2013926 (2020)","journal-title":"IEEE Trans. Inf. Foren. Secur."},{"issue":"4","key":"670_CR41","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"670_CR42","doi-asserted-by":"crossref","unstructured":"Barker, E.: Recommendation for key management:: Part 1 - general, National Institute of Standards and Technology, Gaithersburg, MD, Tech. Rep. NIST SP 800-57pt1r5, (2020)","DOI":"10.6028\/NIST.SP.800-57pt1r5"},{"key":"670_CR43","unstructured":"Group3DMS-Shares\/SecAggProtocol. [Online]. Available: https:\/\/github.com\/Group3DMS-Shares\/SecAggProtocol"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00670-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00670-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00670-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T02:59:55Z","timestamp":1702004395000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00670-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,2]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["670"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00670-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,2]]},"assertion":[{"value":"2 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}}]}}