{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T05:52:16Z","timestamp":1750830736651,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/icc42927.2021.9500936","type":"proceedings-article","created":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T20:49:21Z","timestamp":1628282961000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["On Defensive Neural Networks Against Inference Attack in Federated Learning"],"prefix":"10.1109","author":[{"given":"Hongkyu","family":"Lee","sequence":"first","affiliation":[{"name":"Kennesaw State University,Information and Intelligent Security Lab,Marietta,Georgia,USA"}]},{"given":"Jeehyeong","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea Electronics Technology Institute,South Korea"}]},{"given":"Rasheed","family":"Hussain","sequence":"additional","affiliation":[{"name":"Innopolis University,Networks and Blockchain Lab,Innopolis,Russia"}]},{"given":"Sunghyun","family":"Cho","sequence":"additional","affiliation":[{"name":"Hanyang University,Dept. of Computer Science and Engineering,South Korea"}]},{"given":"Junggab","family":"Son","sequence":"additional","affiliation":[{"name":"Kennesaw State University,Information and Intelligent Security Lab,Marietta,Georgia,USA"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Inverting Gradients - How easy is it to break privacy in federated learning?","volume":"33","author":"geiping","year":"2020","journal-title":"Advances in Neural IInformation Processing Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2019.8927871"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref14","article-title":"cpSGD: Communication-efficient and Differentially-Private Distributed SGD","author":"agarwal","year":"2018","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref16","article-title":"Differentially Private Federated Learning: A Client Level Perspective","author":"geyer","year":"0","journal-title":"NeurIPS 2017 Workshop on Machine Learning on the Phone and other Consumer Devices"},{"key":"ref17","article-title":"Distributed Learning without Distress: Privacy-Preserving Empirical Risk Minimization","author":"jayaraman","year":"2018","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17277-0_9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref3","first-page":"1273","article-title":"Commuinication-Efficient Learning of Deep Networks from Decentralized Data","volume":"54","author":"mcmahan","year":"2017","journal-title":"International Conference on Artificial Intelligence and Statistics (AISTATS)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref8","first-page":"14774","article-title":"Deep Leakage from Gradients","author":"zhu","year":"2019","journal-title":"Advances in Neural IInformation Processing Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148790"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737464"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761315"},{"article-title":"iDLG: Improved Deep Leakage from Gradients","year":"2020","author":"zhao","key":"ref9"},{"key":"ref20","first-page":"493","article-title":"BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning","author":"zhang","year":"2020","journal-title":"USENIX Annual Technical Conference (USENIX ATC)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"}],"event":{"name":"ICC 2021 - IEEE International Conference on Communications","start":{"date-parts":[[2021,6,14]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2021,6,23]]}},"container-title":["ICC 2021 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9500243\/9500244\/09500936.pdf?arnumber=9500936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:08:46Z","timestamp":1659485326000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9500936\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icc42927.2021.9500936","relation":{},"subject":[],"published":{"date-parts":[[2021,6]]}}}