{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T23:44:35Z","timestamp":1775000675560,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1805262"],"award-info":[{"award-number":["U1805262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U61971050"],"award-info":[{"award-number":["U61971050"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3309095","type":"journal-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T17:51:49Z","timestamp":1693245109000},"page":"5860-5875","source":"Crossref","is-referenced-by-count":17,"title":["Privacy-Encoded Federated Learning Against Gradient-Based Data Reconstruction Attacks"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3543-9916","authenticated-orcid":false,"given":"Hongfu","family":"Liu","sequence":"first","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1998-819X","authenticated-orcid":false,"given":"Bin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Changlong","family":"Gao","sequence":"additional","affiliation":[{"name":"China Aneng Construction Group Corporation Ltd., Beijing, China"}]},{"given":"Pei","family":"Xie","sequence":"additional","affiliation":[{"name":"China Aneng Construction Group Corporation Ltd., Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4270-5717","authenticated-orcid":false,"given":"Chenglin","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103320"},{"key":"ref2","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3043262"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2908210"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102252"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3048671"},{"key":"ref7","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"Brendan McMahan","year":"2016","journal-title":"arXiv:1602.05629"},{"key":"ref8","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref10","article-title":"IDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020","journal-title":"arXiv:2001.02610"},{"key":"ref11","article-title":"Inverting gradients\u2014How easy is it to break privacy in federated learning?","author":"Geiping","year":"2020","journal-title":"arXiv:2003.14053"},{"key":"ref12","article-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017","journal-title":"arXiv:1712.07557"},{"key":"ref13","first-page":"1","article-title":"Learning differentially private recurrent language models","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"McMahan"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2925496"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2015-354"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MLHPC.2016.004"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1045"},{"key":"ref19","article-title":"Deep gradient compression: Reducing the communication bandwidth for distributed training","author":"Lin","year":"2017","journal-title":"arXiv:1712.01887"},{"key":"ref20","article-title":"Variance-based gradient compression for efficient distributed deep learning","author":"Tsuzuku","year":"2018","journal-title":"arXiv:1802.06058"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00919"},{"key":"ref22","article-title":"Lecture notes on randomized linear algebra","author":"Mahoney","year":"2016","journal-title":"arXiv:1608.04481"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3163786"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-023-00642-4"},{"key":"ref25","first-page":"12208","article-title":"Large scale private learning via low-rank reparametrization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yu"},{"key":"ref26","article-title":"Federated learning: Strategies for improving communication efficiency","author":"Kone\u010dn\u00fd","year":"2016","journal-title":"arXiv:1610.05492"},{"key":"ref27","article-title":"Communication-efficient federated learning with dual-side low-rank compression","author":"Qiao","year":"2021","journal-title":"arXiv:2104.12416"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2945367"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3073925"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3081560"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2941244"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.037"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466628"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref38","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","volume-title":"Proc. 13th Int. Conf. Artif. Intell. Statist.","author":"Glorot"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1137\/07070471X"},{"issue":"1","key":"ref40","first-page":"2729","article-title":"Improving CUR matrix decomposition and the Nystr\u00f6m approximation via adaptive sampling","volume":"14","author":"Wang","year":"2013","journal-title":"J. Mach. Learn. Res."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1137\/0710036"},{"key":"ref42","article-title":"A framework for evaluating gradient leakage attacks in federated learning","author":"Wei","year":"2020","journal-title":"arXiv:2004.10397"},{"key":"ref43","article-title":"R-GAP: Recursive gradient attack on privacy","author":"Zhu","year":"2020","journal-title":"arXiv:2010.07733"},{"key":"ref44","article-title":"Efficient sparse matrix-vector multiplication on CUDA","author":"Bell","year":"2008"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0014"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref47","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref48","first-page":"1","article-title":"High performance convolutional neural networks for document processing","volume-title":"Proc. 10th Int. Workshop Frontiers Handwriting Recognit.","author":"Chellapilla"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2967243"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.579"},{"key":"ref51","first-page":"1","article-title":"Adversarial examples are not bugs, they are features","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Ilyas"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10231369.pdf?arnumber=10231369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:46:00Z","timestamp":1733877960000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10231369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3309095","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}