{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:31Z","timestamp":1750220071701,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NRF","award":["2018R1A5A1059921"],"award-info":[{"award-number":["2018R1A5A1059921"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3564625.3564657","type":"proceedings-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T01:01:29Z","timestamp":1670029289000},"page":"332-345","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0908-1233","authenticated-orcid":false,"given":"Seung Ho","family":"Na","sequence":"first","affiliation":[{"name":"KAIST, Korea, South \u2013 Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2410-2717","authenticated-orcid":false,"given":"Hyeong Gwon","family":"Hong","sequence":"additional","affiliation":[{"name":"KAIST, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7174-7932","authenticated-orcid":false,"given":"Junmo","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7627-5815","authenticated-orcid":false,"given":"Seungwon","family":"Shin","sequence":"additional","affiliation":[{"name":"KAIST, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","volume-title":"Sanjiv Kumar, and Brendan McMahan.","author":"Agarwal Naman","year":"2018","unstructured":"Naman Agarwal , Ananda\u00a0Theertha Suresh , Felix Xinnan\u00a0X Yu , Sanjiv Kumar, and Brendan McMahan. 2018 . cpSGD: Communication-efficient and differentially-private distributed SGD. Advances in Neural Information Processing Systems 31 (2018). Naman Agarwal, Ananda\u00a0Theertha Suresh, Felix Xinnan\u00a0X Yu, Sanjiv Kumar, and Brendan McMahan. 2018. cpSGD: Communication-efficient and differentially-private distributed SGD. Advances in Neural Information Processing Systems 31 (2018)."},{"key":"e_1_3_2_1_3_1","unstructured":"Alham\u00a0Fikri Aji and Kenneth Heafield. 2017. Sparse communication for distributed gradient descent. arXiv preprint arXiv:1704.05021(2017).  Alham\u00a0Fikri Aji and Kenneth Heafield. 2017. Sparse communication for distributed gradient descent. arXiv preprint arXiv:1704.05021(2017)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2952146"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_6_1","unstructured":"Sebastian Caldas Jakub Kone\u010dny H\u00a0Brendan McMahan and Ameet Talwalkar. 2018. Expanding the reach of federated learning by reducing client resource requirements. arXiv preprint arXiv:1812.07210(2018).  Sebastian Caldas Jakub Kone\u010dny H\u00a0Brendan McMahan and Ameet Talwalkar. 2018. Expanding the reach of federated learning by reducing client resource requirements. arXiv preprint arXiv:1812.07210(2018)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.862083"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364125"},{"volume-title":"30th {USENIX} Security Symposium ({USENIX} Security 21).","author":"Chatel Sylvain","key":"e_1_3_2_1_9_1","unstructured":"Sylvain Chatel , Apostolos Pyrgelis , Juan\u00a0Ram\u00f3n Troncoso-Pastoriza , and Jean-Pierre Hubaux . 2021. Privacy and Integrity Preserving Computations with {CRISP} . In 30th {USENIX} Security Symposium ({USENIX} Security 21). Sylvain Chatel, Apostolos Pyrgelis, Juan\u00a0Ram\u00f3n Troncoso-Pastoriza, and Jean-Pierre Hubaux. 2021. Privacy and Integrity Preserving Computations with {CRISP}. In 30th {USENIX} Security Symposium ({USENIX} Security 21)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11728"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1001"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966217"},{"key":"e_1_3_2_1_13_1","unstructured":"Emiliano De\u00a0Cristofaro. 2020. An overview of privacy in machine learning. arXiv preprint arXiv:2005.08679(2020).  Emiliano De\u00a0Cristofaro. 2020. An overview of privacy in machine learning. arXiv preprint arXiv:2005.08679(2020)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth 2014. The algorithmic foundations of differential privacy.Foundations and Trends in Theoretical Computer Science 9 3-4(2014) 211\u2013407.  Cynthia Dwork Aaron Roth 2014. The algorithmic foundations of differential privacy.Foundations and Trends in Theoretical Computer Science 9 3-4(2014) 211\u2013407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Yanai Elazar and Yoav Goldberg. 2018. Adversarial Removal of Demographic Attributes from Text Data. In EMNLP.  Yanai Elazar and Yoav Goldberg. 2018. Adversarial Removal of Demographic Attributes from Text Data. In EMNLP.","DOI":"10.18653\/v1\/D18-1002"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00017"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_21"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243834"},{"key":"e_1_3_2_1_22_1","unstructured":"Jonas Geiping Hartmut Bauermeister Hannah Dr\u00f6ge and Michael Moeller. 2020. Inverting Gradients\u2013How easy is it to break privacy in federated learning?. In Advances in Neural Information Processing Systems.  Jonas Geiping Hartmut Bauermeister Hannah Dr\u00f6ge and Michael Moeller. 2020. Inverting Gradients\u2013How easy is it to break privacy in federated learning?. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_23_1","unstructured":"Robin\u00a0C Geyer Tassilo Klein and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557(2017).  Robin\u00a0C Geyer Tassilo Klein and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557(2017)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 32nd International Conference on International Conference on Machine Learning -","volume":"37","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy . 2015 . Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift . In Proceedings of the 32nd International Conference on International Conference on Machine Learning - Volume 37 (Lille, France) (ICML\u201915). JMLR.org, 448\u2013456. Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In Proceedings of the 32nd International Conference on International Conference on Machine Learning - Volume 37 (Lille, France) (ICML\u201915). JMLR.org, 448\u2013456."},{"key":"e_1_3_2_1_27_1","unstructured":"Swanand Kadhe Nived Rajaraman O\u00a0Ozan Koyluoglu and Kannan Ramchandran. 2020. FastSecAgg: Scalable Secure Aggregation for Privacy-Preserving Federated Learning. arXiv preprint arXiv:2009.11248(2020).  Swanand Kadhe Nived Rajaraman O\u00a0Ozan Koyluoglu and Kannan Ramchandran. 2020. FastSecAgg: Scalable Secure Aggregation for Privacy-Preserving Federated Learning. arXiv preprint arXiv:2009.11248(2020)."},{"key":"e_1_3_2_1_28_1","unstructured":"Georgios\u00a0A Kaissis Marcus\u00a0R Makowski Daniel R\u00fcckert and Rickmer\u00a0F Braren. 2020. Secure privacy-preserving and federated machine learning in medical imaging. Nature Machine Intelligence(2020) 1\u20137.  Georgios\u00a0A Kaissis Marcus\u00a0R Makowski Daniel R\u00fcckert and Rickmer\u00a0F Braren. 2020. Secure privacy-preserving and federated machine learning in medical imaging. Nature Machine Intelligence(2020) 1\u20137."},{"key":"e_1_3_2_1_29_1","first-page":"793","article-title":"What can we learn privately?SIAM J","volume":"40","author":"Kasiviswanathan Shiva\u00a0Prasad","year":"2011","unstructured":"Shiva\u00a0Prasad Kasiviswanathan , Homin\u00a0 K Lee , Kobbi Nissim , Sofya Raskhodnikova , and Adam Smith . 2011 . What can we learn privately?SIAM J . Comput. 40 , 3 (2011), 793 \u2013 826 . Shiva\u00a0Prasad Kasiviswanathan, Homin\u00a0K Lee, Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. 2011. What can we learn privately?SIAM J. Comput. 40, 3 (2011), 793\u2013826.","journal-title":"Comput."},{"key":"e_1_3_2_1_30_1","unstructured":"Deep Kawa Sunaina Punyani Priya Nayak Arpita Karkera and Varshapriya Jyotinagar. 2019. Credit Risk Assessment from Combined Bank Records using Federated Learning. (2019).  Deep Kawa Sunaina Punyani Priya Nayak Arpita Karkera and Varshapriya Jyotinagar. 2019. Credit Risk Assessment from Combined Bank Records using Federated Learning. (2019)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00029"},{"key":"e_1_3_2_1_32_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014).","author":"Kingma P","year":"2014","unstructured":"Diederik\u00a0 P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014). Diederik\u00a0P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014)."},{"key":"e_1_3_2_1_33_1","unstructured":"Jakub Kone\u010dn\u1ef3 H\u00a0Brendan McMahan Daniel Ramage and Peter Richt\u00e1rik. 2016. Federated optimization: Distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527(2016).  Jakub Kone\u010dn\u1ef3 H\u00a0Brendan McMahan Daniel Ramage and Peter Richt\u00e1rik. 2016. Federated optimization: Distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527(2016)."},{"key":"e_1_3_2_1_34_1","unstructured":"Jakub Kone\u010dn\u1ef3 H\u00a0Brendan McMahan Felix\u00a0X Yu Peter Richt\u00e1rik Ananda\u00a0Theertha Suresh and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492(2016).  Jakub Kone\u010dn\u1ef3 H\u00a0Brendan McMahan Felix\u00a0X Yu Peter Richt\u00e1rik Ananda\u00a0Theertha Suresh and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492(2016)."},{"key":"e_1_3_2_1_35_1","unstructured":"A. Krizhevsky and G. Hinton. 2009. Learning multiple layers of features from tiny images. Master\u2019s thesis Department of Computer Science University of Toronto (2009).  A. Krizhevsky and G. Hinton. 2009. Learning multiple layers of features from tiny images. Master\u2019s thesis Department of Computer Science University of Toronto (2009)."},{"key":"e_1_3_2_1_36_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Leino Klas","year":"2020","unstructured":"Klas Leino and Matt Fredrikson . 2020 . Stolen Memories: Leveraging Model Memorization for Calibrated {White-Box} Membership Inference . In 29th USENIX Security Symposium (USENIX Security 20) . 1605\u20131622. Klas Leino and Matt Fredrikson. 2020. Stolen Memories: Leveraging Model Memorization for Calibrated {White-Box} Membership Inference. In 29th USENIX Security Symposium (USENIX Security 20). 1605\u20131622."},{"key":"e_1_3_2_1_37_1","volume-title":"Think Locally","author":"Liang Paul\u00a0Pu","year":"2001","unstructured":"Paul\u00a0Pu Liang , Terrance Liu , Ziyin Liu , Ruslan Salakhutdinov , and Louis-Philippe Morency . 2019. Think Locally , Act Globally : Federated Learning with Local and Global Representations. ArXiv abs\/ 2001 .01523(2019). Paul\u00a0Pu Liang, Terrance Liu, Ziyin Liu, Ruslan Salakhutdinov, and Louis-Philippe Morency. 2019. Think Locally, Act Globally: Federated Learning with Local and Global Representations. ArXiv abs\/2001.01523(2019)."},{"key":"e_1_3_2_1_38_1","volume-title":"Deep Gradient Compression: Reducing the Communication Bandwidth for Distributed Training. In International Conference on Learning Representations.","author":"Lin Yujun","year":"2018","unstructured":"Yujun Lin , Song Han , Huizi Mao , Yu Wang , and Bill Dally . 2018 . Deep Gradient Compression: Reducing the Communication Bandwidth for Distributed Training. In International Conference on Learning Representations. Yujun Lin, Song Han, Huizi Mao, Yu Wang, and Bill Dally. 2018. Deep Gradient Compression: Reducing the Communication Bandwidth for Distributed Training. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_39_1","volume-title":"On the limited memory BFGS method for large scale optimization. Mathematical programming 45, 1-3","author":"Liu C","year":"1989","unstructured":"Dong\u00a0 C Liu and Jorge Nocedal . 1989. On the limited memory BFGS method for large scale optimization. Mathematical programming 45, 1-3 ( 1989 ), 503\u2013528. Dong\u00a0C Liu and Jorge Nocedal. 1989. On the limited memory BFGS method for large scale optimization. Mathematical programming 45, 1-3 (1989), 503\u2013528."},{"key":"e_1_3_2_1_40_1","unstructured":"Yugeng Liu Rui Wen Xinlei He Ahmed Salem Zhikun Zhang Michael Backes Emiliano De\u00a0Cristofaro Mario Fritz and Yang Zhang. 2021. ML-Doctor: Holistic risk assessment of inference attacks against machine learning models. arXiv preprint arXiv:2102.02551(2021).  Yugeng Liu Rui Wen Xinlei He Ahmed Salem Zhikun Zhang Michael Backes Emiliano De\u00a0Cristofaro Mario Fritz and Yang Zhang. 2021. ML-Doctor: Holistic risk assessment of inference attacks against machine learning models. arXiv preprint arXiv:2102.02551(2021)."},{"key":"e_1_3_2_1_41_1","volume-title":"2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 954\u2013964","author":"Luping WANG","year":"2019","unstructured":"WANG Luping , WANG Wei , and LI Bo . 2019 . Cmfl: Mitigating communication overhead for federated learning . In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 954\u2013964 . WANG Luping, WANG Wei, and LI Bo. 2019. Cmfl: Mitigating communication overhead for federated learning. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 954\u2013964."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299155"},{"key":"e_1_3_2_1_43_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise\u00a0Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics. PMLR 1273\u20131282.  Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise\u00a0Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics. PMLR 1273\u20131282."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"volume-title":"R\u00e9nyi differential privacy. In 2017 IEEE 30th computer security foundations symposium (CSF)","author":"Mironov Ilya","key":"e_1_3_2_1_45_1","unstructured":"Ilya Mironov . 2017. R\u00e9nyi differential privacy. In 2017 IEEE 30th computer security foundations symposium (CSF) . IEEE , 263\u2013275. Ilya Mironov. 2017. R\u00e9nyi differential privacy. In 2017 IEEE 30th computer security foundations symposium (CSF). IEEE, 263\u2013275."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466628"},{"key":"e_1_3_2_1_47_1","volume-title":"Invariant representations without adversarial training. Advances in Neural Information Processing Systems 31","author":"Moyer Daniel","year":"2018","unstructured":"Daniel Moyer , Shuyang Gao , Rob Brekelmans , Aram Galstyan , and Greg Ver\u00a0Steeg . 2018. Invariant representations without adversarial training. Advances in Neural Information Processing Systems 31 ( 2018 ). Daniel Moyer, Shuyang Gao, Rob Brekelmans, Aram Galstyan, and Greg Ver\u00a0Steeg. 2018. Invariant representations without adversarial training. Advances in Neural Information Processing Systems 31 (2018)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/3104322.3104425"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_51_1","volume-title":"International Conference on Artificial Intelligence and Statistics. 2021\u20132031","author":"Reisizadeh Amirhossein","year":"2020","unstructured":"Amirhossein Reisizadeh , Aryan Mokhtari , Hamed Hassani , Ali Jadbabaie , and Ramtin Pedarsani . 2020 . Fedpaq: A communication-efficient federated learning method with periodic averaging and quantization . In International Conference on Artificial Intelligence and Statistics. 2021\u20132031 . Amirhossein Reisizadeh, Aryan Mokhtari, Hamed Hassani, Ali Jadbabaie, and Ramtin Pedarsani. 2020. Fedpaq: A communication-efficient federated learning method with periodic averaging and quantization. In International Conference on Artificial Intelligence and Statistics. 2021\u20132031."},{"volume-title":"Vol.\u00a01","author":"Sabt Mohamed","key":"e_1_3_2_1_52_1","unstructured":"Mohamed Sabt , Mohammed Achemlal , and Abdelmadjid Bouabdallah . 2015. Trusted execution environment: what it is, and what it is not. In 2015 IEEE Trustcom\/BigDataSE\/ISPA , Vol.\u00a01 . IEEE , 57\u201364. Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah. 2015. Trusted execution environment: what it is, and what it is not. In 2015 IEEE Trustcom\/BigDataSE\/ISPA, Vol.\u00a01. IEEE, 57\u201364."},{"key":"e_1_3_2_1_53_1","volume-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246(2018).","author":"Salem Ahmed","year":"2018","unstructured":"Ahmed Salem , Yang Zhang , Mathias Humbert , Pascal Berrang , Mario Fritz , and Michael Backes . 2018 . Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246(2018). Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2018. Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246(2018)."},{"key":"e_1_3_2_1_54_1","volume-title":"Robust and communication-efficient federated learning from non-iid data","author":"Sattler Felix","year":"2019","unstructured":"Felix Sattler , Simon Wiedemann , Klaus-Robert M\u00fcller , and Wojciech Samek . 2019. Robust and communication-efficient federated learning from non-iid data . IEEE transactions on neural networks and learning systems ( 2019 ). Felix Sattler, Simon Wiedemann, Klaus-Robert M\u00fcller, and Wojciech Samek. 2019. Robust and communication-efficient federated learning from non-iid data. IEEE transactions on neural networks and learning systems (2019)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174426"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_57_1","unstructured":"Jinhyun So Basak Guler and A\u00a0Salman Avestimehr. 2020. Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning. arXiv preprint arXiv:2002.04156(2020).  Jinhyun So Basak Guler and A\u00a0Salman Avestimehr. 2020. Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning. arXiv preprint arXiv:2002.04156(2020)."},{"key":"e_1_3_2_1_58_1","volume-title":"Overlearning Reveals Sensitive Attributes. In 8th International Conference on Learning Representations, ICLR","author":"Song Congzheng","year":"2020","unstructured":"Congzheng Song and Vitaly Shmatikov . 2020 . Overlearning Reveals Sensitive Attributes. In 8th International Conference on Learning Representations, ICLR 2020. Congzheng Song and Vitaly Shmatikov. 2020. Overlearning Reveals Sensitive Attributes. In 8th International Conference on Learning Representations, ICLR 2020."},{"key":"e_1_3_2_1_59_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Song Liwei","year":"2021","unstructured":"Liwei Song and Prateek Mittal . 2021 . Systematic evaluation of privacy risks of machine learning models . In 30th USENIX Security Symposium (USENIX Security 21) . 2615\u20132632. Liwei Song and Prateek Mittal. 2021. Systematic evaluation of privacy risks of machine learning models. In 30th USENIX Security Symposium (USENIX Security 21). 2615\u20132632."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005465"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"e_1_3_2_1_63_1","unstructured":"Hongyi Wang Mikhail Yurochkin Yuekai Sun Dimitris Papailiopoulos and Yasaman Khazaeni. 2020. Federated learning with matched averaging. arXiv preprint arXiv:2002.06440(2020).  Hongyi Wang Mikhail Yurochkin Yuekai Sun Dimitris Papailiopoulos and Yasaman Khazaeni. 2020. Federated learning with matched averaging. arXiv preprint arXiv:2002.06440(2020)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357371"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339474"},{"key":"e_1_3_2_1_68_1","volume-title":"FFD: A Federated Learning Based Method for Credit Card Fraud Detection. In International Conference on Big Data. Springer, 18\u201332","author":"Yang Wensi","year":"2019","unstructured":"Wensi Yang , Yuhang Zhang , Kejiang Ye , Li Li , and Cheng-Zhong Xu . 2019 . FFD: A Federated Learning Based Method for Credit Card Fraud Detection. In International Conference on Big Data. Springer, 18\u201332 . Wensi Yang, Yuhang Zhang, Kejiang Ye, Li Li, and Cheng-Zhong Xu. 2019. FFD: A Federated Learning Based Method for Credit Card Fraud Detection. In International Conference on Big Data. Springer, 18\u201332."},{"key":"e_1_3_2_1_69_1","unstructured":"Xin Yao Tianchi Huang Chenglei Wu Rui-Xiao Zhang and Lifeng Sun. 2019. Federated Learning with Additional Mechanisms on Clients to Reduce Communication Costs. arXiv preprint arXiv:1908.05891(2019).  Xin Yao Tianchi Huang Chenglei Wu Rui-Xiao Zhang and Lifeng Sun. 2019. Federated Learning with Additional Mechanisms on Clients to Reduce Communication Costs. arXiv preprint arXiv:1908.05891(2019)."},{"volume-title":"Privacy risk in machine learning: Analyzing the connection to overfitting. In 2018 IEEE 31st computer security foundations symposium (CSF)","author":"Yeom Samuel","key":"e_1_3_2_1_70_1","unstructured":"Samuel Yeom , Irene Giacomelli , Matt Fredrikson , and Somesh Jha . 2018. Privacy risk in machine learning: Analyzing the connection to overfitting. In 2018 IEEE 31st computer security foundations symposium (CSF) . IEEE , 268\u2013282. Samuel Yeom, Irene Giacomelli, Matt Fredrikson, and Somesh Jha. 2018. Privacy risk in machine learning: Analyzing the connection to overfitting. In 2018 IEEE 31st computer security foundations symposium (CSF). IEEE, 268\u2013282."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037194"},{"key":"e_1_3_2_1_72_1","unstructured":"Ligeng Zhu Zhijian Liu and Song Han. 2019. Deep leakage from gradients. In Advances in Neural Information Processing Systems. 14774\u201314784.  Ligeng Zhu Zhijian Liu and Song Han. 2019. Deep leakage from gradients. In Advances in Neural Information Processing Systems. 14774\u201314784."}],"event":{"name":"ACSAC: Annual Computer Security Applications Conference","acronym":"ACSAC","location":"Austin TX USA"},"container-title":["Proceedings of the 38th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3564657","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564625.3564657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:12Z","timestamp":1750183752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3564657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":71,"alternative-id":["10.1145\/3564625.3564657","10.1145\/3564625"],"URL":"https:\/\/doi.org\/10.1145\/3564625.3564657","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}