{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:07:29Z","timestamp":1770739649251,"version":"3.49.0"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010083","name":"Hunan Provincial Innovation Foundation For Postgraduate","doi-asserted-by":"publisher","award":["CX20250632"],"award-info":[{"award-number":["CX20250632"]}],"id":[{"id":"10.13039\/501100010083","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472166"],"award-info":[{"award-number":["62472166"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62441233"],"award-info":[{"award-number":["62441233"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472158"],"award-info":[{"award-number":["62472158"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102337"],"award-info":[{"award-number":["62102337"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22A2030"],"award-info":[{"award-number":["U22A2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Young Elite Scientists Sponsorship Program by China Association for Science and Technology","award":["2023QNRC001"],"award-info":[{"award-number":["2023QNRC001"]}]},{"name":"Science and Technology Innovation Program of Hunan Province","award":["2024RC3102"],"award-info":[{"award-number":["2024RC3102"]}]},{"name":"Open Topics from the Lion Rock Labs of Cyberspace Security","award":["LRL24015"],"award-info":[{"award-number":["LRL24015"]}]},{"name":"Technology Projects of Hunan Province","award":["2015TP1004"],"award-info":[{"award-number":["2015TP1004"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,2,15]]},"DOI":"10.1109\/jiot.2025.3636944","type":"journal-article","created":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T18:29:54Z","timestamp":1764095394000},"page":"6564-6574","source":"Crossref","is-referenced-by-count":0,"title":["Unifying Gradient Leakage Attacks Against Privacy-Protected Federated Learning in IoT Networks"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2589-4384","authenticated-orcid":false,"given":"Hui","family":"Zhou","sequence":"first","affiliation":[{"name":"College of Cyber Science and Technology, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-3887","authenticated-orcid":false,"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[{"name":"College of Cyber Science and Technology, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6221-8142","authenticated-orcid":false,"given":"Peng","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Computer Science, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9321-4540","authenticated-orcid":false,"given":"Xin","family":"Deng","sequence":"additional","affiliation":[{"name":"College of Computer Science, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8583-3557","authenticated-orcid":false,"given":"Yipeng","family":"Zou","sequence":"additional","affiliation":[{"name":"College of Computer Science, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6241-3546","authenticated-orcid":false,"given":"Xiaoshuai","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Cyber Science and Technology, Hunan University, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist","volume":"54","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3470774"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3306778"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.005.2500035"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2025.3568637"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2025.3548476"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2025.3526606"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3496502"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3423718"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2025.3600270"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.101.2100125"},{"key":"ref12","article-title":"Federated recommendation with additive personalization","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Li"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3354924"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3329061"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3325822"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3351864"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3339702"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621333"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3538887"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3389011"},{"key":"ref21","first-page":"14747","article-title":"Deep leakage from gradients","author":"Mu","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref22","article-title":"IDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020","journal-title":"arXiv:2001.02610"},{"key":"ref23","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Geiping"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01607"},{"key":"ref25","first-page":"3045","article-title":"SoK: On gradient leakage in federated learning","volume-title":"Proc. 34th USENIX Secur. Symp. (USENIX Secur. 25)","author":"Du"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621090"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref28","first-page":"6381","article-title":"Gradient obfuscation gives a false sense of security in federated learning","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Yue"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00989"},{"key":"ref30","article-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017","journal-title":"arXiv:1712.07557"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3417930"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3317870"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00919"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690304"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MDM58254.2023.00042"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3343288"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_3"},{"key":"ref38","article-title":"R-GAP: Recursive gradient attack on privacy","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Zhu"},{"key":"ref39","article-title":"Understanding training-data leakage from gradients in neural networks for image classification","author":"Chen","year":"2021","journal-title":"arXiv:2111.10178"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00458"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-40442-0_9"},{"key":"ref42","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. NIPS","volume":"33","author":"Ho"},{"key":"ref43","first-page":"29898","article-title":"Gradient inversion with generative image prior","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Jeon"},{"key":"ref44","article-title":"Exploring user-level gradient inversion with a diffusion prior","author":"Li","year":"2024","journal-title":"arXiv:2409.07291"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i25.34829"},{"key":"ref46","article-title":"Gradient inversion of federated diffusion models","author":"Huang","year":"2024","journal-title":"arXiv:2405.20380"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645514"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3227761"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229091"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3387570"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref52","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2024","journal-title":"Handbook Systemic Autoimmune Diseases"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00251"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3271432"},{"key":"ref58","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Goodfellow"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11372629\/11267396.pdf?arnumber=11267396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:09:09Z","timestamp":1770671349000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11267396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,15]]},"references-count":58,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3636944","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,15]]}}}