{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T10:08:43Z","timestamp":1776247723237,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB3106900"],"award-info":[{"award-number":["2023YFB3106900"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372334"],"award-info":[{"award-number":["62372334"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1109\/tnsm.2024.3474717","type":"journal-article","created":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T17:44:58Z","timestamp":1728323098000},"page":"930-940","source":"Crossref","is-referenced-by-count":3,"title":["SplitAUM: Auxiliary Model-Based Label Inference Attack Against Split Learning"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7410-3112","authenticated-orcid":false,"given":"Kai","family":"Zhao","sequence":"first","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"given":"Xiaowei","family":"Chuo","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"given":"Fangchao","family":"Yu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3334-6150","authenticated-orcid":false,"given":"Bo","family":"Zeng","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"given":"Zhi","family":"Pang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8085-1312","authenticated-orcid":false,"given":"Lina","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2763440"},{"key":"ref3","article-title":"BART: Denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension","author":"Lewis","year":"2019","journal-title":"arXiv:1910.13461"},{"key":"ref4","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Brown"},{"key":"ref5","volume-title":"Market Size and Revenue Comparison for Artificial Intelligence Worldwide From 2018 to 2030","year":"2022"},{"key":"ref6","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Artif. Intell. Statist.","author":"McMahan"},{"key":"ref7","article-title":"Split learning for health: Distributed deep learning without sharing raw patient data","author":"Vepakomma","year":"2018","journal-title":"arXiv:1812.00564"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.003"},{"key":"ref9","article-title":"Label leakage and protection in two-party split learning","author":"Li","year":"2021","journal-title":"arXiv:2102.08504"},{"key":"ref10","article-title":"Detailed comparison of communication efficiency of split learning and federated learning","author":"Singh","year":"2019","journal-title":"arXiv:1909.09145"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70604-3_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref13","article-title":"Split learning for collaborative deep learning in healthcare","author":"Poirot","year":"2019","journal-title":"arXiv:1912.12115"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3360468.3368176"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2978824"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN49451.2021.9528601"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485259"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3559613.3563198"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24874"},{"key":"ref20","first-page":"5271","article-title":"{PCAT}: Functionality and data stealing from split learning by {pseudo-client} attack","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Security)","author":"Gao"},{"key":"ref21","article-title":"Passive inference attacks on split learning via adversarial Regularization","author":"Zhu","year":"2023","journal-title":"arXiv preprint arXiv:2310.10483"},{"key":"ref22","first-page":"1397","article-title":"Label inference attacks against vertical federated learning","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Security)","author":"Fu"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3145347"},{"key":"ref24","first-page":"14774","article-title":"Deep leakage from gradients","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","volume":"32","author":"Zhu"},{"key":"ref25","article-title":"idlg: Improved deep leakage from gradients","author":"Zhao","year":"2020","journal-title":"arXiv:2001.02610"},{"key":"ref26","first-page":"1727","article-title":"Revealing and protecting labels in distributed training","volume-title":"Proc. 35th Conf. Neural Inf. Process. Syst.","volume":"34","author":"Dang"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3559613.3563201"},{"key":"ref28","article-title":"FALCON: Honest-majority maliciously secure framework for private deep learning","author":"Wagh","year":"2020","journal-title":"arXiv:2004.02229"},{"key":"ref29","first-page":"35","article-title":"ABY3: A mixed protocol framework for machine learning","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Secur.","author":"Mohassel"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref31","first-page":"2165","article-title":"{ABY2.0}: Improved {mixed-protocol} secure {two-party} computation","volume-title":"Proc. 30th USENIX Security Symp. (USENIX Security)","author":"Patra"},{"key":"ref32","first-page":"27131","article-title":"Deep learning with label differential privacy","volume-title":"Proc. 35th Int. Conf. Neural Inf. Process. Syst.","volume":"34","author":"Ghazi"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26770"},{"key":"ref34","article-title":"Differentially private label protection in split learning","author":"Yang","year":"2022","journal-title":"arXiv:2203.02073"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.naacl-srw.22"},{"key":"ref36","article-title":"Splitnn-driven vertical partitioning","author":"Ceballos","year":"2020","journal-title":"arXiv:2008.04137"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3356821"},{"key":"ref38","article-title":"Label inference attack against split learning under regression setting","author":"Xie","year":"2023","journal-title":"arXiv:2301.07284"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3293417"},{"key":"ref41","article-title":"Opacus: User-friendly differential privacy library in PyTorch","author":"Yousefpour","year":"2021","journal-title":"arXiv:2109.12298"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/10927606\/10706105.pdf?arnumber=10706105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T17:40:48Z","timestamp":1742233248000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10706105\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":41,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2024.3474717","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]}}}