{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T08:02:42Z","timestamp":1761897762749,"version":"3.37.3"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100015570","name":"NFSC","doi-asserted-by":"publisher","award":["61876038,61872244"],"award-info":[{"award-number":["61876038,61872244"]}],"id":[{"id":"10.13039\/100015570","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/icme52920.2022.9859857","type":"proceedings-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T19:45:18Z","timestamp":1661543118000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Individual Property Inference Over Collaborative Learning in Deep Feature Space"],"prefix":"10.1109","author":[{"given":"Haoxin","family":"Yang","sequence":"first","affiliation":[{"name":"Shenzhen University,Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security,Shenzhen,China"}]},{"given":"Yi","family":"Wang","sequence":"additional","affiliation":[{"name":"Dongguan University of Technology,Dongguan,China"}]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[{"name":"Shenzhen University,Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security,Shenzhen,China"}]}],"member":"263","reference":[{"key":"ref10","article-title":"See through gradients: Image batch recovery via gradinversion","author":"hongxu","year":"2021","journal-title":"Computer Vision and Pattern Recognition"},{"key":"ref11","article-title":"Gradient inversion with generative image prior","author":"jeon","year":"0","journal-title":"Advances in neural information processing systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484533"},{"key":"ref13","article-title":"Large scale distributed deep networks","author":"jeffrey","year":"0","journal-title":"Advances in Neural Information Processing Systems 2012"},{"key":"ref14","article-title":"Privacy-preserving collaborative deep learning with unreliable participants","author":"zhao","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref16","article-title":"How transferable are features in deep neural networks?","author":"yosinski","year":"0","journal-title":"Advances in neural information processing systems"},{"key":"ref17","article-title":"Visualizing data using t-sne","author":"van dermaaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00053"},{"journal-title":"The caltech-ucsd birds-200&#x2013;2011 dataset","year":"2011","author":"wah","key":"ref19"},{"key":"ref4","article-title":"Federated learning for keyword spotting","author":"leroy","year":"0","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700202"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"journal-title":"A Survey of Privacy Attacks in Machine Learning","year":"2020","author":"rigaki","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i08.7021"},{"journal-title":"Federated learning Strategies for improving communication efficiency","year":"2016","author":"kone?n?","key":"ref1"},{"journal-title":"Inverting gradients-how easy is it to break privacy in federated learning?","year":"2020","author":"geiping","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2011.5981788"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459250"},{"key":"ref24","article-title":"Privacy-preserving deep learning","author":"shokri","year":"0","journal-title":"ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref23","article-title":"The algorithmic foundations of differential privacy","author":"dwork","year":"2014","journal-title":"Foundations and Trends in Theoretical Computer Science"}],"event":{"name":"2022 IEEE International Conference on Multimedia and Expo (ICME)","start":{"date-parts":[[2022,7,18]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2022,7,22]]}},"container-title":["2022 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9859562\/9858923\/09859857.pdf?arnumber=9859857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T20:25:02Z","timestamp":1663619102000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9859857\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icme52920.2022.9859857","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}