{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:40:52Z","timestamp":1774917652027,"version":"3.50.1"},"reference-count":40,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1016\/j.hcc.2024.100235","type":"journal-article","created":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T10:56:18Z","timestamp":1715943378000},"page":"100235","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"title":["Data distribution inference attack in federated learning via reinforcement learning support"],"prefix":"10.1016","volume":"5","author":[{"given":"Dongxiao","family":"Yu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4387-1140","authenticated-orcid":false,"given":"Hengming","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7775-4597","authenticated-orcid":false,"given":"Yan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhenzhen","family":"Xie","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2024.100235_b1","article-title":"Clustered federated learning with adaptive local differential privacy on heterogeneous iot data","author":"He","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"1\u20132","key":"10.1016\/j.hcc.2024.100235_b2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000083","article-title":"Advances and open problems in federated learning","volume":"14","author":"Kairouz","year":"2021","journal-title":"Found. Trends Mach. Learn."},{"key":"10.1016\/j.hcc.2024.100235_b3","series-title":"Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"key":"10.1016\/j.hcc.2024.100235_b4","series-title":"International Conference on Machine Learning","first-page":"11372","article-title":"Crfl: Certifiably robust federated learning against backdoor attacks","author":"Xie","year":"2021"},{"issue":"3","key":"10.1016\/j.hcc.2024.100235_b5","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1016\/j.jbi.2013.03.008","article-title":"Expectation propagation logistic regression (explorer): distributed privacy-preserving online model learning","volume":"46","author":"Wang","year":"2013","journal-title":"J. Biomed. Inform."},{"key":"10.1016\/j.hcc.2024.100235_b6","article-title":"Confidence-based similarity-aware personalized federated learning for autonomous IoT","author":"Han","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.hcc.2024.100235_b7","series-title":"Threats to federated learning: A survey","author":"Lyu","year":"2020"},{"issue":"2","key":"10.1016\/j.hcc.2024.100235_b8","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1109\/TII.2021.3073925","article-title":"Privacy threat and defense for federated learning with non-iid data in AIoT","volume":"18","author":"Xiong","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.hcc.2024.100235_b9","article-title":"Deep leakage from gradients","volume":"32","author":"Zhu","year":"2019","journal-title":"Adv. Neural Inf. Process Syst."},{"key":"10.1016\/j.hcc.2024.100235_b10","series-title":"Idlg: Improved deep leakage from gradients","author":"Zhao","year":"2020"},{"key":"10.1016\/j.hcc.2024.100235_b11","article-title":"Communication efficient distributed machine learning with the parameter server","volume":"27","author":"Li","year":"2014","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.hcc.2024.100235_b12","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2021.106775","article-title":"A survey on federated learning","volume":"216","author":"Zhang","year":"2021","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.hcc.2024.100235_b13","series-title":"Fast and easy distributed deep learning in TensorFlow","author":"Sergeev","year":"2018"},{"issue":"2","key":"10.1016\/j.hcc.2024.100235_b14","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.jpdc.2008.09.002","article-title":"Bandwidth optimal all-reduce algorithms for clusters of workstations","volume":"69","author":"Patarasuk","year":"2009","journal-title":"J. Parallel Distrib. Comput."},{"key":"10.1016\/j.hcc.2024.100235_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2020.106854","article-title":"A review of applications in federated learning","volume":"149","author":"Li","year":"2020","journal-title":"Comput. Ind. Eng."},{"issue":"5","key":"10.1016\/j.hcc.2024.100235_b16","doi-asserted-by":"crossref","first-page":"3088","DOI":"10.1109\/JIOT.2020.3007662","article-title":"Realizing the heterogeneity: A self-organized federated learning framework for IoT","volume":"8","author":"Pang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.hcc.2024.100235_b17","series-title":"European Symposium on Research in Computer Security","first-page":"545","article-title":"A framework for evaluating client privacy leakages in federated learning","author":"Wei","year":"2020"},{"key":"10.1016\/j.hcc.2024.100235_b18","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume":"33","author":"Geiping","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"11","key":"10.1016\/j.hcc.2024.100235_b19","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow","year":"2020","journal-title":"Commun. ACM"},{"key":"10.1016\/j.hcc.2024.100235_b20","article-title":"A review on generative adversarial networks: Algorithms, theory, and applications","author":"Gui","year":"2021","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.hcc.2024.100235_b21","doi-asserted-by":"crossref","unstructured":"M. Fredrikson, S. Jha, T. Ristenpart, Model inversion attacks that exploit confidence information and basic countermeasures, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 1322\u20131333.","DOI":"10.1145\/2810103.2813677"},{"key":"10.1016\/j.hcc.2024.100235_b22","doi-asserted-by":"crossref","unstructured":"B. Hitaj, G. Ateniese, F. Perez-Cruz, Deep models under the GAN: information leakage from collaborative deep learning, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 603\u2013618.","DOI":"10.1145\/3133956.3134012"},{"key":"10.1016\/j.hcc.2024.100235_b23","series-title":"2019 IEEE Symposium on Security and Privacy","first-page":"691","article-title":"Exploiting unintended feature leakage in collaborative learning","author":"Melis","year":"2019"},{"key":"10.1016\/j.hcc.2024.100235_b24","series-title":"2017 IEEE Symposium on Security and Privacy","first-page":"3","article-title":"Membership inference attacks against machine learning models","author":"Shokri","year":"2017"},{"key":"10.1016\/j.hcc.2024.100235_b25","series-title":"A survey of reinforcement learning informed by natural language","author":"Luketina","year":"2019"},{"issue":"7","key":"10.1016\/j.hcc.2024.100235_b26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3543846","article-title":"Reinforcement learning based recommender systems: A survey","volume":"55","author":"Afsar","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.hcc.2024.100235_b27","series-title":"Ask the right questions: Active question reformulation with reinforcement learning","author":"Buck","year":"2017"},{"key":"10.1016\/j.hcc.2024.100235_b28","series-title":"Shortest-path constrained reinforcement learning for sparse reward tasks","author":"Sohn","year":"2021"},{"key":"10.1016\/j.hcc.2024.100235_b29","series-title":"Rrl: Resnet as representation for reinforcement learning","author":"Shah","year":"2021"},{"key":"10.1016\/j.hcc.2024.100235_b30","doi-asserted-by":"crossref","unstructured":"H. Xu, X. Zhan, X. Zhu, Constraints penalized q-learning for safe offline reinforcement learning, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 36, (8) 2022, pp. 8753\u20138760.","DOI":"10.1609\/aaai.v36i8.20855"},{"key":"10.1016\/j.hcc.2024.100235_b31","series-title":"A brief survey of deep reinforcement learning","author":"Arulkumaran","year":"2017"},{"key":"10.1016\/j.hcc.2024.100235_b32","series-title":"Continuous control with deep reinforcement learning","author":"Lillicrap","year":"2015"},{"key":"10.1016\/j.hcc.2024.100235_b33","doi-asserted-by":"crossref","unstructured":"S. Li, Y. Wu, X. Cui, H. Dong, F. Fang, S. Russell, Robust multi-agent reinforcement learning via minimax deep deterministic policy gradient, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 33, (01) 2019, pp. 4213\u20134220.","DOI":"10.1609\/aaai.v33i01.33014213"},{"key":"10.1016\/j.hcc.2024.100235_b34","series-title":"Soft actor-critic algorithms and applications","author":"Haarnoja","year":"2018"},{"issue":"11","key":"10.1016\/j.hcc.2024.100235_b35","doi-asserted-by":"crossref","first-page":"6584","DOI":"10.1109\/TNNLS.2021.3082568","article-title":"Distributional soft actor-critic: Off-policy reinforcement learning for addressing value estimation errors","volume":"33","author":"Duan","year":"2021","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.hcc.2024.100235_b36","series-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017"},{"key":"10.1016\/j.hcc.2024.100235_b37","series-title":"On the convergence of fedavg on non-iid data","author":"Li","year":"2019"},{"key":"10.1016\/j.hcc.2024.100235_b38","first-page":"10572","article-title":"Fedavg with fine tuning: Local updates lead to representation learning","volume":"35","author":"Collins","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.hcc.2024.100235_b39","first-page":"10752","article-title":"On convergence of FedProx: Local dissimilarity invariant bounds, non-smoothness and beyond","volume":"35","author":"Yuan","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.hcc.2024.100235_b40","doi-asserted-by":"crossref","unstructured":"Q. Li, B. He, D. Song, Model-contrastive federated learning, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 10713\u201310722.","DOI":"10.1109\/CVPR46437.2021.01057"}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295224000382?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295224000382?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T21:18:16Z","timestamp":1745011096000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295224000382"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["S2667295224000382"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2024.100235","relation":{},"ISSN":["2667-2952"],"issn-type":[{"value":"2667-2952","type":"print"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Data distribution inference attack in federated learning via reinforcement learning support","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2024.100235","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100235"}}