{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T14:17:38Z","timestamp":1765808258208},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,28]]},"DOI":"10.1109\/icc45041.2023.10279702","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:54:10Z","timestamp":1698083650000},"page":"5066-5071","source":"Crossref","is-referenced-by-count":6,"title":["GBMIA: Gradient-based Membership Inference Attack in Federated Learning"],"prefix":"10.1109","author":[{"given":"Xiaodong","family":"Wang","sequence":"first","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University,China"}]},{"given":"Naiyu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University,China"}]},{"given":"Longfei","family":"Wu","sequence":"additional","affiliation":[{"name":"Fayetteville State University,Department of Mathematics &#x0026; Computer Science,Fayetteville,NC,USA"}]},{"given":"Zhitao","family":"Guan","sequence":"additional","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University,China"}]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology,Department of Electrical and Computer Engineering,Hoboken,NJ,USA"}]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[{"name":"Mohamed Bin Zayed University of Artificial Intelligence,Machine Learning Department,Abu Dhabi,UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.071278"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800353"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685821"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3028110"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref7","first-page":"5558","article-title":"White-box vs black-box: Bayes optimal strategies for membership inference","volume-title":"International Conference on Machine Learning (ICML)","author":"Sablayrolles"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3523273"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148790"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23119"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106587"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2841047"},{"key":"ref15","first-page":"87","article-title":"Systematizing genome privacy research: A privacy-e Membership Inference Attacks Against Recommender Systems nhancing technologies perspective","volume-title":"19th Privacy Enhancing Technologies Symposium (PETs)","author":"Mittos","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23183"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2021.103977"},{"key":"ref18","first-page":"1964","article-title":"Label-only membership inference attacks","volume-title":"International Conference on Machine Learning (ICML)","author":"Choquette-Choo","year":"2021"},{"key":"ref19","first-page":"1605","article-title":"Stolen memories: Leveraging model memorization for calibrated white-box membership inference","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Leino"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00129"},{"key":"ref21","article-title":"Membership inference attack susceptibility of clinical language models","author":"Jagannatha","year":"2021","journal-title":"arXiv preprint"},{"key":"ref22","first-page":"3407","article-title":"Clustered sampling: Low-variance and improved representativity for clients selection in federated learning","volume-title":"International Conference on Machine Learning (ICML)","author":"Fraboni"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17093"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54365-8_8"}],"event":{"name":"ICC 2023 - IEEE International Conference on Communications","start":{"date-parts":[[2023,5,28]]},"location":"Rome, Italy","end":{"date-parts":[[2023,6,1]]}},"container-title":["ICC 2023 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10278505\/10278554\/10279702.pdf?arnumber=10279702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T09:36:22Z","timestamp":1710408982000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10279702\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icc45041.2023.10279702","relation":{},"subject":[],"published":{"date-parts":[[2023,5,28]]}}}