{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T15:05:03Z","timestamp":1775055903951,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3573942.3573974","type":"proceedings-article","created":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T23:45:42Z","timestamp":1684280742000},"page":"205-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["SGDE: Secure Generative Data Exchange for Cross-Silo Federated Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4007-3207","authenticated-orcid":false,"given":"Eugenio","family":"Lomurno","sequence":"first","affiliation":[{"name":"Politecnico, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3826-4645","authenticated-orcid":false,"given":"Alberto","family":"Archetti","sequence":"additional","affiliation":[{"name":"Politecnico, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8484-3536","authenticated-orcid":false,"given":"Lorenzo","family":"Cazzella","sequence":"additional","affiliation":[{"name":"Politecnico, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3325-9225","authenticated-orcid":false,"given":"Stefano","family":"Samele","sequence":"additional","affiliation":[{"name":"Politecnico, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5987-7646","authenticated-orcid":false,"given":"Leonardo","family":"Di Perna","sequence":"additional","affiliation":[{"name":"Politecnico, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8306-6739","authenticated-orcid":false,"given":"Matteo","family":"Matteucci","sequence":"additional","affiliation":[{"name":"Politecnico, Italy"}]}],"member":"320","published-online":{"date-parts":[[2023,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.21552\/EDPL"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"e_1_3_2_1_4_1","volume-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data. arXiv:1602.05629 [cs] (Feb","author":"McMahan H. Brendan","year":"2017","unstructured":"H. Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Ag\u00fcera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. arXiv:1602.05629 [cs] (Feb. 2017). arXiv: 1602.05629."},{"key":"e_1_3_2_1_5_1","volume-title":"Threats to Federated Learning: A Survey. arXiv:2003.02133 [cs, stat] (March","author":"Lyu Lingjuan","year":"2020","unstructured":"Lingjuan Lyu, Han Yu, and Qiang Yang. 2020. Threats to Federated Learning: A Survey. arXiv:2003.02133 [cs, stat] (March 2020). arXiv: 2003.02133."},{"key":"e_1_3_2_1_6_1","volume-title":"Robust aggregation for federated learning. arXiv preprint arXiv:1912.13445","author":"Pillutla Krishna","year":"2019","unstructured":"Krishna Pillutla, Sham M Kakade, and Zaid Harchaoui. 2019. Robust aggregation for federated learning. arXiv preprint arXiv:1912.13445 (2019)."},{"key":"e_1_3_2_1_7_1","volume-title":"Expanding the reach of federated learning by reducing client resource requirements. arXiv preprint arXiv:1812.07210","author":"Caldas Sebastian","year":"2018","unstructured":"Sebastian Caldas, Jakub Kone\u010dny, H Brendan McMahan, and Ameet Talwalkar. 2018. Expanding the reach of federated learning by reducing client resource requirements. arXiv preprint arXiv:1812.07210 (2018)."},{"key":"e_1_3_2_1_8_1","volume-title":"2020 USENIX Annual Technical Conference (USENIX ATC 20)","author":"Zhang Chengliang","year":"2020","unstructured":"Chengliang Zhang, Suyi Li, Junzhe Xia, Wei Wang, Feng Yan, and Yang Liu. 2020. {BatchCrypt}: Efficient Homomorphic Encryption for Cross-Silo Federated Learning. In 2020 USENIX Annual Technical Conference (USENIX ATC 20). 493\u2013 506."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS"},{"key":"e_1_3_2_1_10_1","volume-title":"Mitigating Sybils in Federated Learning Poisoning. arXiv:1808.04866 [cs, stat] (July","author":"Fung Clement","year":"2020","unstructured":"Clement Fung, Chris J. M. Yoon, and Ivan Beschastnikh. 2020. Mitigating Sybils in Federated Learning Poisoning. arXiv:1808.04866 [cs, stat] (July 2020). arXiv: 1808.04866."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Peter Kairouz H. Brendan McMahan Brendan Avent Aur\u00e9lien Bellet Mehdi Bennis Arjun Nitin Bhagoji Kallista Bonawitz Zachary Charles Graham Cormode Rachel Cummings Rafael G. L. D'Oliveira Hubert Eichner Salim El Rouayheb David Evans Josh Gardner Zachary Garrett Adri\u00e0 Gasc\u00f3n Badih Ghazi Phillip B. Gibbons Marco Gruteser Zaid Harchaoui Chaoyang He Lie He Zhouyuan Huo Ben Hutchinson Justin Hsu Martin Jaggi Tara Javidi Gauri Joshi Mikhail Khodak Jakub Kone\u010dn\u00fd Aleksandra Korolova Farinaz Koushanfar Sanmi Koyejo Tancr\u00e8de Lepoint Yang Liu Prateek Mittal Mehryar Mohri Richard Nock Ayfer \u00d6zg\u00fcr Rasmus Pagh Mariana Raykova Hang Qi Daniel Ramage Ramesh Raskar Dawn Song Weikang Song Sebastian U. Stich Ziteng Sun Ananda Theertha Suresh Florian Tram\u00e8r Praneeth Vepakomma Jianyu Wang Li Xiong Zheng Xu Qiang Yang Felix X. Yu Han Yu and Sen Zhao. 2021. Advances and Open Problems in Federated Learning. arXiv:1912.04977 [cs stat] (March 2021). arXiv: 1912.04977.","DOI":"10.1561\/9781680837896"},{"key":"e_1_3_2_1_12_1","volume-title":"Ananda Theertha Suresh, and Dave Bacon","author":"Kone\u010dn\u00fd Jakub","year":"2017","unstructured":"Jakub Kone\u010dn\u00fd, H. Brendan McMahan, Felix X. Yu, Peter Richt\u00e1rik, Ananda Theertha Suresh, and Dave Bacon. 2017. Federated Learning: Strategies for Improving Communication Efficiency. arXiv:1610.05492 [cs] (Oct. 2017). arXiv: 1610.05492."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2944481"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"e_1_3_2_1_15_1","volume-title":"Sustainable Federated Learning. arXiv:2102.11274 [cs, math] (Feb","author":"Guler Basak","year":"2021","unstructured":"Basak Guler and Aylin Yener. 2021. Sustainable Federated Learning. arXiv:2102.11274 [cs, math] (Feb. 2021). arXiv: 2102.11274."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3037554"},{"key":"e_1_3_2_1_17_1","volume-title":"Agnostic Federated Learning. arXiv:1902.00146 [cs, stat] (Jan","author":"Mohri Mehryar","year":"2019","unstructured":"Mehryar Mohri, Gary Sivek, and Ananda Theertha Suresh. 2019. Agnostic Federated Learning. arXiv:1902.00146 [cs, stat] (Jan. 2019). arXiv: 1902.00146."},{"key":"e_1_3_2_1_18_1","volume-title":"Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, and Virginia Smith.","author":"Li Tian","year":"2020","unstructured":"Tian Li, Anit Kumar Sahu, Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, and Virginia Smith. 2020. Federated Optimization in Heterogeneous Networks. arXiv:1812.06127 [cs, stat] (April 2020). arXiv: 1812.06127."},{"key":"e_1_3_2_1_19_1","volume-title":"Mohammad Mahdi Kamani, and Mehrdad Mahdavi","author":"Deng Yuyang","year":"2020","unstructured":"Yuyang Deng, Mohammad Mahdi Kamani, and Mehrdad Mahdavi. 2020. Adaptive Personalized Federated Learning. arXiv:2003.13461 [cs, stat] (Nov. 2020). arXiv: 2003.13461."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS"},{"key":"e_1_3_2_1_21_1","volume-title":"Personalized Federated Learning: A Meta-Learning Approach. arXiv:2002.07948 [cs, math, stat] (Oct","author":"Fallah Alireza","year":"2020","unstructured":"Alireza Fallah, Aryan Mokhtari, and Asuman Ozdaglar. 2020. Personalized Federated Learning: A Meta-Learning Approach. arXiv:2002.07948 [cs, math, stat] (Oct. 2020). arXiv: 2002.07948."},{"key":"e_1_3_2_1_22_1","volume-title":"Improving Federated Learning Personalization via Model Agnostic Meta Learning. arXiv:1909.12488 [cs, stat] (Sept","author":"Jiang Yihan","year":"2019","unstructured":"Yihan Jiang, Jakub Kone\u010dn\u00fd, Keith Rush, and Sreeram Kannan. 2019. Improving Federated Learning Personalization via Model Agnostic Meta Learning. arXiv:1909.12488 [cs, stat] (Sept. 2019). arXiv: 1909.12488."},{"key":"e_1_3_2_1_23_1","volume-title":"Model-Agnostic MetaLearning for Fast Adaptation of Deep Networks. arXiv:1703.03400 [cs] (July","author":"Finn Chelsea","year":"2017","unstructured":"Chelsea Finn, Pieter Abbeel, and Sergey Levine. 2017. Model-Agnostic MetaLearning for Fast Adaptation of Deep Networks. arXiv:1703.03400 [cs] (July 2017). arXiv: 1703.03400."},{"key":"e_1_3_2_1_24_1","volume-title":"Personalized Cross-Silo Federated Learning on Non-IID Data. arXiv:2007.03797 [cs, stat] (Dec","author":"Huang Yutao","year":"2021","unstructured":"Yutao Huang, Lingyang Chu, Zirui Zhou, Lanjun Wang, Jiangchuan Liu, Jian Pei, and Yong Zhang. 2021. Personalized Cross-Silo Federated Learning on Non-IID Data. arXiv:2007.03797 [cs, stat] (Dec. 2021). arXiv: 2007.03797."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_26_1","volume-title":"Gaussian differential privacy. arXiv preprint arXiv:1905.02383","author":"Dong Jinshuo","year":"2019","unstructured":"Jinshuo Dong, Aaron Roth, and Weijie J Su. 2019. Gaussian differential privacy. arXiv preprint arXiv:1905.02383 (2019)."},{"key":"e_1_3_2_1_27_1","volume-title":"Concentrated differential privacy. arXiv preprint arXiv:1603.01887","author":"Dwork Cynthia","year":"2016","unstructured":"Cynthia Dwork and Guy N Rothblum. 2016. Concentrated differential privacy. arXiv preprint arXiv:1603.01887 (2016)."},{"key":"e_1_3_2_1_28_1","volume-title":"R\u00e9nyi differential privacy. In 2017 IEEE 30th computer security foundations symposium (CSF)","author":"Mironov Ilya","unstructured":"Ilya Mironov. 2017. R\u00e9nyi differential privacy. In 2017 IEEE 30th computer security foundations symposium (CSF). IEEE, 263\u2013275."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_30_1","volume-title":"Article arXiv:1610.05755 (Oct.","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot, Mart\u00edn Abadi, \u00dalfar Erlingsson, Ian Goodfellow, and Kunal Talwar. 2016. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. arXiv e-prints, Article arXiv:1610.05755 (Oct. 2016), arXiv:1610.05755 pages. arXiv:1610.05755 [stat.ML]"},{"key":"e_1_3_2_1_31_1","volume-title":"Generative Adversarial Networks. arXiv:1406.2661 [cs, stat] (June","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David WardeFarley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Networks. arXiv:1406.2661 [cs, stat] (June 2014). arXiv: 1406.2661."},{"key":"e_1_3_2_1_32_1","volume-title":"Kingma and Max Welling","author":"Diederik","year":"2014","unstructured":"Diederik P. Kingma and Max Welling. 2014. Auto-Encoding Variational Bayes. arXiv:1312.6114 [cs, stat] (May 2014). arXiv: 1312.6114."},{"key":"e_1_3_2_1_33_1","volume-title":"Differentially Private Data Generative Models. arXiv:1812.02274 [cs] (Dec","author":"Chen Qingrong","year":"2018","unstructured":"Qingrong Chen, Chong Xiang, Minhui Xue, Bo Li, Nikita Borisov, Dali Kaarfar, and Haojin Zhu. 2018. Differentially Private Data Generative Models. arXiv:1812.02274 [cs] (Dec. 2018). arXiv: 1812.02274."},{"key":"e_1_3_2_1_34_1","volume-title":"Differentially Private Generative Adversarial Network. arXiv:1802.06739 [cs, stat] (Feb","author":"Xie Liyang","year":"2018","unstructured":"Liyang Xie, Kaixiang Lin, Shu Wang, Fei Wang, and Jiayu Zhou. 2018. Differentially Private Generative Adversarial Network. arXiv:1802.06739 [cs, stat] (Feb. 2018). arXiv: 1802.06739."},{"key":"e_1_3_2_1_35_1","volume-title":"DPD-InfoGAN: Differentially Private Distributed InfoGAN. arXiv:2010.11398 [cs] (March","author":"Mugunthan Vaikkunth","year":"2021","unstructured":"Vaikkunth Mugunthan, Vignesh Gokul, Lalana Kagal, and Shlomo Dubnov. 2021. DPD-InfoGAN: Differentially Private Distributed InfoGAN. arXiv:2010.11398 [cs] (March 2021). arXiv: 2010.11398."},{"key":"e_1_3_2_1_36_1","volume-title":"DP-CGAN: Differentially Private Synthetic Data and Label Generation. arXiv:2001.09700 [cs, stat] (Jan","author":"Torkzadehmahani Reihaneh","year":"2020","unstructured":"Reihaneh Torkzadehmahani, Peter Kairouz, and Benedict Paten. 2020. DP-CGAN: Differentially Private Synthetic Data and Label Generation. arXiv:2001.09700 [cs, stat] (Jan. 2020). arXiv: 2001.09700."},{"key":"e_1_3_2_1_37_1","volume-title":"R\u00e9nyi Differential Privacy of the Sampled Gaussian Mechanism. arXiv preprint arXiv:1908.10530","author":"Mironov Ilya","year":"2019","unstructured":"Ilya Mironov, Kunal Talwar, and Li Zhang. 2019. R\u00e9nyi Differential Privacy of the Sampled Gaussian Mechanism. arXiv preprint arXiv:1908.10530 (2019)."},{"key":"e_1_3_2_1_38_1","volume-title":"Amaresh Ankit Siva, and Rachel Cummings","author":"Tantipongpipat Uthaipon","year":"2020","unstructured":"Uthaipon Tantipongpipat, Chris Waites, Digvijay Boob, Amaresh Ankit Siva, and Rachel Cummings. 2020. Differentially Private Synthetic Mixed-Type Data Generation for Unsupervised Learning. arXiv:1912.03250 [cs, stat] (Dec. 2020). arXiv: 1912.03250."},{"key":"e_1_3_2_1_39_1","volume-title":"PATE-GAN: Generating Synthetic Data with Differential Privacy Guarantees. In International Conference on Learning Representations.","author":"Yoon Jinsung","unstructured":"Jinsung Yoon, James Jordon, and Mihaela van der Schaar. 2019. PATE-GAN: Generating Synthetic Data with Differential Privacy Guarantees. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2855136"},{"key":"e_1_3_2_1_41_1","volume-title":"LOGAN: Membership Inference Attacks Against Generative Models. arXiv:1705.07663 [cs] (Aug.","author":"Hayes Jamie","year":"2018","unstructured":"Jamie Hayes, Luca Melis, George Danezis, and Emiliano De Cristofaro. 2018. LOGAN: Membership Inference Attacks Against Generative Models. arXiv:1705.07663 [cs] (Aug. 2018). arXiv: 1705.07663."},{"key":"e_1_3_2_1_42_1","volume-title":"Membership Inference Attacks against Machine Learning Models. arXiv:1610.05820 [cs, stat] (March","author":"Shokri Reza","year":"2017","unstructured":"Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership Inference Attacks against Machine Learning Models. arXiv:1610.05820 [cs, stat] (March 2017). arXiv: 1610.05820."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"e_1_3_2_1_45_1","first-page":"1333","article-title":"Privacy preserving deep learning via additively homomorphic encryption","volume":"13","author":"Aono Yoshinori","year":"2017","unstructured":"Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai, 2017. Privacy preserving deep learning via additively homomorphic encryption. IEEE Transactions on Information Forensics and Security 13, 5 (2017), 1333\u20131345.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_46_1","first-page":"61","article-title":"Membership Inference Attack against Differentially Private Deep Learning","volume":"11","author":"Rahman Md Atiqur","year":"2018","unstructured":"Md Atiqur Rahman, Tanzila Rahman, Robert Lagani\u00e8re, Noman Mohammed, and Yang Wang. 2018. Membership Inference Attack against Differentially Private Deep Learning Model. Trans. Data Priv. 11, 1 (2018), 61\u201379.","journal-title":"Model. Trans. Data Priv."},{"key":"e_1_3_2_1_47_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository."},{"key":"e_1_3_2_1_48_1","volume-title":"MNIST handwritten digit database. ATT Labs [Online]. Available: http:\/\/yann.lecun.com\/exdb\/mnist 2","author":"LeCun Yann","year":"2010","unstructured":"Yann LeCun, Corinna Cortes, and CJ Burges. 2010. MNIST handwritten digit database. ATT Labs [Online]. Available: http:\/\/yann.lecun.com\/exdb\/mnist 2 (2010)."},{"key":"e_1_3_2_1_49_1","volume-title":"Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. CoRR abs\/1708.07747","author":"Xiao Han","year":"2017","unstructured":"Han Xiao, Kashif Rasul, and Roland Vollgraf. 2017. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. CoRR abs\/1708.07747 (2017). arXiv:1708.07747"},{"key":"e_1_3_2_1_50_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_51_1","volume-title":"2017 International Conference on Learning Representations (ICLR).","author":"Higgins Irina","year":"2017","unstructured":"Irina Higgins, Loic Matthey, Arka Pal, Christopher Burgess, Xavier Glorot, Matthew Botvinick, Shakir Mohamed, and Alexander Lerchner. 2017. betavae: Learning basic visual concepts with a constrained variational framework. In 2017 International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0008"},{"key":"e_1_3_2_1_53_1","volume-title":"Searching for activation functions. arXiv preprint arXiv:1710.05941","author":"Ramachandran Prajit","year":"2017","unstructured":"Prajit Ramachandran, Barret Zoph, and Quoc V Le. 2017. Searching for activation functions. arXiv preprint arXiv:1710.05941 (2017)."}],"event":{"name":"AIPR 2022: 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","location":"Xiamen China","acronym":"AIPR 2022"},"container-title":["Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3573974","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573942.3573974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:22Z","timestamp":1750182562000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3573974"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":53,"alternative-id":["10.1145\/3573942.3573974","10.1145\/3573942"],"URL":"https:\/\/doi.org\/10.1145\/3573942.3573974","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2023-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}