{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:32:53Z","timestamp":1730248373268,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000288","name":"Royal Society","doi-asserted-by":"publisher","award":["IEC\/NSFC\/223152"],"award-info":[{"award-number":["IEC\/NSFC\/223152"]}],"id":[{"id":"10.13039\/501100000288","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000844","name":"European Space Agency","doi-asserted-by":"publisher","award":["12893212"],"award-info":[{"award-number":["12893212"]}],"id":[{"id":"10.13039\/501100000844","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,3,25]]},"DOI":"10.1109\/icit58233.2024.10540758","type":"proceedings-article","created":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T17:38:41Z","timestamp":1717609121000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Leakage in Federated Home Applications Using Gradient Inversion Algorithms"],"prefix":"10.1109","author":[{"given":"Wenzhi","family":"Chen","sequence":"first","affiliation":[{"name":"Durham University,Department of Engineering,Durham,UK,DHI 3LE"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hongjian","family":"Sun","sequence":"additional","affiliation":[{"name":"Durham University,Department of Engineering,Durham,UK,DHI 3LE"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Minglei","family":"You","sequence":"additional","affiliation":[{"name":"University of Nottingham,Department of Electrical and Electronic Engineering,Nottingham,UK,NG8 IBB"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jing","family":"Jiang","sequence":"additional","affiliation":[{"name":"Northumbria University,Department of Mathematics, Physics and Electrical Engineering,Newcastle upon Tyne,UK,NEI 8ST"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume":"1","author":"McMahan","year":"2017","journal-title":"Artifical intelligence and statistics"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2022.108830"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2023.3292382"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3283347"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557226"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3576842.3582328"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICNWC57852.2023.10127398"},{"issue":"1","key":"ref8","first-page":"1","article-title":"Deep leakage from gradients","volume":"32","author":"Zhu","year":"2019","journal-title":"Advances in neural information processing systems"},{"issue":"1","key":"ref9","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume":"33","author":"Geiping","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"1","key":"ref10","first-page":"1","article-title":"iDLG: Improved deep leakage from gradients","volume":"1","author":"Zhao","year":"2020","journal-title":"arXiv"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01607"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4135\/9781412952644.n239"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"volume-title":"Individual household electric power consumption dataset, 2006-2010","year":"2022","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2015.7"},{"issue":"1","key":"ref16","first-page":"1","article-title":"Adam: A method for stochastic optimization","volume":"1","author":"Kingma","year":"2014","journal-title":"arXiv preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"}],"event":{"name":"2024 IEEE International Conference on Industrial Technology (ICIT)","start":{"date-parts":[[2024,3,25]]},"location":"Bristol, United Kingdom","end":{"date-parts":[[2024,3,27]]}},"container-title":["2024 IEEE International Conference on Industrial Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10540646\/10540608\/10540758.pdf?arnumber=10540758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T04:59:37Z","timestamp":1717736377000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10540758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,25]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icit58233.2024.10540758","relation":{},"subject":[],"published":{"date-parts":[[2024,3,25]]}}}