{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:09:42Z","timestamp":1773274182402,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T00:00:00Z","timestamp":1644883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T00:00:00Z","timestamp":1644883200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T00:00:00Z","timestamp":1644883200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T00:00:00Z","timestamp":1644883200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1747783"],"award-info":[{"award-number":["CNS-1747783"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-2007210"],"award-info":[{"award-number":["CCF-2007210"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Industrial Members of NSF Center for Big Learning"},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1722791"],"award-info":[{"award-number":["IIS-1722791"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,2,15]]},"DOI":"10.1109\/jiot.2021.3089713","type":"journal-article","created":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T20:03:50Z","timestamp":1623873830000},"page":"2555-2565","source":"Crossref","is-referenced-by-count":35,"title":["Beyond Class-Level Privacy Leakage: Breaking Record-Level Privacy in Federated Learning"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0782-4187","authenticated-orcid":false,"given":"Xiaoyong","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Xiyao","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7144-9089","authenticated-orcid":false,"given":"Lan","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1079-3871","authenticated-orcid":false,"given":"Yuguang","family":"Fang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1755-0183","authenticated-orcid":false,"given":"Dapeng","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Stat.","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref3","first-page":"374","article-title":"Towards federated learning at scale: System design","volume-title":"Proc. 2nd Mach. Learn. Syst. Conf.","volume":"1","author":"Bonawitz"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036890"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417113"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443795"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1561\/9781601984616"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.46647\/ijetms.2022.v06i05.052"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-69250-1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23551-2_2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00041"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref15","volume-title":"A framework for evaluating gradient leakage attacks in federated learning","author":"Wei","year":"2020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref17","volume-title":"Inverting gradients\u2014How easy is it to break privacy in federated learning?","author":"Geiping","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2016.2515610"},{"key":"ref20","first-page":"267","article-title":"The secret sharer: Evaluating and testing unintended memorization in neural networks","volume-title":"Proc. 28th USENIX Security Symp.","author":"Carlini"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761315"},{"key":"ref22","article-title":"On the convergence of FedAvg on non-IID data","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Li"},{"key":"ref23","first-page":"2766","article-title":"Dynamic evaluation of neural sequence models","volume-title":"Proc. 35th Int. Conf. Mach. Learn. (ICML)","author":"Krause"},{"key":"ref24","article-title":"On the state of the art of evaluation in neural language models","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Melis"},{"key":"ref25","article-title":"Regularizing and optimizing LSTM language models","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Merity"},{"key":"ref26","article-title":"Recurrent batch normalization","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Cooijmans"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref28","first-page":"4189","article-title":"Recurrent highway networks","volume-title":"Proc. 34th Int. Conf. Mach. Learn. (ICML)","author":"Zilly"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref30","first-page":"14774","article-title":"Deep leakage from gradients","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Zhu","year":"2019"},{"key":"ref31","volume-title":"iDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020"},{"issue":"1","key":"ref32","first-page":"31","article-title":"An estimate of an upper bound for the entropy of English","volume":"18","author":"Brown","year":"1992","journal-title":"Comput. Linguist."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.2307\/1422689"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.21236\/ADA273556"},{"key":"ref35","article-title":"Pointer sentinel mixture models","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Merity"},{"key":"ref36","volume-title":"Large text compression benchmark","author":"Mahoney","year":"2020"},{"key":"ref37","first-page":"1","article-title":"Adam: A method for stochastic optimization","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Kingma"},{"key":"ref38","article-title":"Adversarial training methods for semi-supervised text classification","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Miyato"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354211"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref41","first-page":"1895","article-title":"Evaluating differentially private machine learning in practice","volume-title":"Proc. 28th USENIX Conf. Security Symp.","author":"Jayaraman"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6488907\/9704905\/9456909-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9704905\/09456909.pdf?arnumber=9456909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:35:25Z","timestamp":1705016125000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9456909\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,15]]},"references-count":41,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3089713","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,15]]}}}