{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T15:30:54Z","timestamp":1775662254996,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T00:00:00Z","timestamp":1697846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"China NSF grant","award":["No. 62132018, U2268204, 62272307, 61902248, 61972254, 61972252, 62025204, 62072303"],"award-info":[{"award-number":["No. 62132018, U2268204, 62272307, 61902248, 61972254, 61972252, 62025204, 62072303"]}]},{"name":"Shanghai Science and Technology fund","award":["20PJ1407900"],"award-info":[{"award-number":["20PJ1407900"]}]},{"name":"National Key R&D Program of China","award":["No. 2020YFB1707900"],"award-info":[{"award-number":["No. 2020YFB1707900"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,21]]},"DOI":"10.1145\/3583780.3615019","type":"proceedings-article","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T07:45:42Z","timestamp":1697874342000},"page":"2492-2501","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["PSLF: Defending Against Label Leakage in Split Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-2096-6122","authenticated-orcid":false,"given":"Xinwei","family":"Wan","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7214-0665","authenticated-orcid":false,"given":"Jiankai","family":"Sun","sequence":"additional","affiliation":[{"name":"Bytedance Inc., Seattle, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9311-102X","authenticated-orcid":false,"given":"Shengjie","family":"Wang","sequence":"additional","affiliation":[{"name":"Bytedance Inc., Seattle, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7975-0651","authenticated-orcid":false,"given":"Lei","family":"Chen","sequence":"additional","affiliation":[{"name":"Bytedance Inc., San Jose, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5094-5331","authenticated-orcid":false,"given":"Zhenzhe","family":"Zheng","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0965-9058","authenticated-orcid":false,"given":"Fan","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6934-1685","authenticated-orcid":false,"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"PPSL: Privacy-Preserving Text Classification for Split Learning. In 4th International Conference on Data Intelligence and Security. 160--167","author":"Alnasser Walaa","year":"2022","unstructured":"Walaa Alnasser , Ghazaleh Beigi , Ahmadreza Mosallanezhad , and Huan Liu . 2022 . PPSL: Privacy-Preserving Text Classification for Split Learning. In 4th International Conference on Data Intelligence and Security. 160--167 . Walaa Alnasser, Ghazaleh Beigi, Ahmadreza Mosallanezhad, and Huan Liu. 2022. PPSL: Privacy-Preserving Text Classification for Split Learning. In 4th International Conference on Data Intelligence and Security. 160--167."},{"key":"e_1_3_2_1_2_1","volume-title":"Information and Communications Security - 24th International Conference. 281--300.","author":"Alromih Arwa","unstructured":"Arwa Alromih , John A. Clark , and Prosanta Gope . 2022. Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids . In Information and Communications Security - 24th International Conference. 281--300. Arwa Alromih, John A. Clark, and Prosanta Gope. 2022. Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids. In Information and Communications Security - 24th International Conference. 281--300."},{"key":"e_1_3_2_1_3_1","unstructured":"Avazu. 2015. Avazu click-through rate prediction. https:\/\/www.kaggle.com\/c\/ avazu-ctr-prediction\/data.  Avazu. 2015. Avazu click-through rate prediction. https:\/\/www.kaggle.com\/c\/ avazu-ctr-prediction\/data."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHI54592.2022.00048"},{"key":"e_1_3_2_1_5_1","volume-title":"Efficient Split Learning with Non-iid Data. In 23rd IEEE International Conference on Mobile Data Management. 128--136","author":"Cai Yuanqin","year":"2022","unstructured":"Yuanqin Cai and Tongquan Wei . 2022 . Efficient Split Learning with Non-iid Data. In 23rd IEEE International Conference on Mobile Data Management. 128--136 . Yuanqin Cai and Tongquan Wei. 2022. Efficient Split Learning with Non-iid Data. In 23rd IEEE International Conference on Mobile Data Management. 128--136."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2022.3205555"},{"key":"e_1_3_2_1_7_1","unstructured":"Criteo. 2014. Criteo display advertising challenge. https:\/\/www.kaggle.com\/c\/ criteo-display-ad-challenge\/data.  Criteo. 2014. Criteo display advertising challenge. https:\/\/www.kaggle.com\/c\/ criteo-display-ad-challenge\/data."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2931903"},{"key":"e_1_3_2_1_9_1","first-page":"5983","article-title":"Combined Federated and Split Learning in Edge Computing for Ubiquitous Intelligence in Internet of Things","volume":"22","author":"Duan Qiang","year":"2022","unstructured":"Qiang Duan , Shijing Hu , Ruijun Deng , and Zhihui Lu . 2022 . Combined Federated and Split Learning in Edge Computing for Ubiquitous Intelligence in Internet of Things : State-of-the-Art and Future Directions. Sensors , Vol. 22 , 16 (2022), 5983 . Qiang Duan, Shijing Hu, Ruijun Deng, and Zhihui Lu. 2022. Combined Federated and Split Learning in Edge Computing for Ubiquitous Intelligence in Internet of Things: State-of-the-Art and Future Directions. Sensors, Vol. 22, 16 (2022), 5983.","journal-title":"State-of-the-Art and Future Directions. Sensors"},{"key":"e_1_3_2_1_10_1","volume-title":"33rd International Colloquium","volume":"4052","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork . 2006 . Differential Privacy. In Automata, Languages and Programming , 33rd International Colloquium , Vol. 4052 . 1--12. Cynthia Dwork. 2006. Differential Privacy. In Automata, Languages and Programming, 33rd International Colloquium, Vol. 4052. 1--12."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v7i3.405"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 21st Workshop on Privacy in the Electronic Society. 125--137","author":"Erdogan Ege","unstructured":"Ege Erdogan , Alptekin K\u00fc pcc \u00fc, and A. Erc\u00fc ment cC icc ek. 2022a. SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning . In Proceedings of the 21st Workshop on Privacy in the Electronic Society. 125--137 . Ege Erdogan, Alptekin K\u00fc pcc \u00fc, and A. Erc\u00fc ment cC icc ek. 2022a. SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. In Proceedings of the 21st Workshop on Privacy in the Electronic Society. 125--137."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 21st Workshop on Privacy in the Electronic Society. 115--124","author":"Erdogan Ege","unstructured":"Ege Erdogan , Alptekin K\u00fc pcc \u00fc, and A. Erc\u00fc ment cC icc ek. 2022b. UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks against Split Learning . In Proceedings of the 21st Workshop on Privacy in the Electronic Society. 115--124 . Ege Erdogan, Alptekin K\u00fc pcc \u00fc, and A. Erc\u00fc ment cC icc ek. 2022b. UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks against Split Learning. In Proceedings of the 21st Workshop on Privacy in the Electronic Society. 115--124."},{"key":"e_1_3_2_1_14_1","volume-title":"International Conference on Artificial Intelligence and Statistics","volume":"151","author":"Esfandiari Hossein","year":"2022","unstructured":"Hossein Esfandiari , Vahab S. Mirrokni , Umar Syed , and Sergei Vassilvitskii . 2022 . Label differential privacy via clustering . In International Conference on Artificial Intelligence and Statistics , Vol. 151 . 7055--7075. Hossein Esfandiari, Vahab S. Mirrokni, Umar Syed, and Sergei Vassilvitskii. 2022. Label differential privacy via clustering. In International Conference on Artificial Intelligence and Statistics, Vol. 151. 7055--7075."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_3_2_1_16_1","volume-title":"Deep Learning with Label Differential Privacy. In Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems","author":"Ghazi Badih","year":"2021","unstructured":"Badih Ghazi , Noah Golowich , Ravi Kumar , Pasin Manurangsi , and Chiyuan Zhang . 2021 . Deep Learning with Label Differential Privacy. In Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021. 27131--27145. Badih Ghazi, Noah Golowich, Ravi Kumar, Pasin Manurangsi, and Chiyuan Zhang. 2021. Deep Learning with Label Differential Privacy. In Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021. 27131--27145."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3108455"},{"key":"e_1_3_2_1_18_1","volume-title":"12th International Symposium on Parallel Architectures, Algorithms and Programming","author":"Hou Dongkun","unstructured":"Dongkun Hou , Jie Zhang , Jieming Ma , Xiaohui Zhu , and Ka Lok Man . 2021. Application of Differential Privacy for Collaborative Filtering Based Recommendation System: A Survey . In 12th International Symposium on Parallel Architectures, Algorithms and Programming . IEEE , 97--101. Dongkun Hou, Jie Zhang, Jieming Ma, Xiaohui Zhu, and Ka Lok Man. 2021. Application of Differential Privacy for Collaborative Filtering Based Recommendation System: A Survey. In 12th International Symposium on Parallel Architectures, Algorithms and Programming. IEEE, 97--101."},{"key":"e_1_3_2_1_19_1","volume-title":"Qureshi","author":"Kariyappa Sanjay","year":"2021","unstructured":"Sanjay Kariyappa and Moinuddin K . Qureshi . 2021 . Gradient Inversion Attack: Leaking Private Labels in Two-Party Split Learning. CoRR , Vol. abs\/ 2112 .01299 (2021), 1--13. Sanjay Kariyappa and Moinuddin K. Qureshi. 2021. Gradient Inversion Attack: Leaking Private Labels in Two-Party Split Learning. CoRR, Vol. abs\/2112.01299 (2021), 1--13."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360468.3368176"},{"key":"e_1_3_2_1_21_1","volume-title":"ResSFL: A Resistance Transfer Framework for Defending Model Inversion Attack in Split Federated Learning. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 10184--10192","author":"Li Jingtao","year":"2022","unstructured":"Jingtao Li , Adnan Siraj Rakin , Xing Chen , Zhezhi He , Deliang Fan , and Chaitali Chakrabarti . 2022 a. ResSFL: A Resistance Transfer Framework for Defending Model Inversion Attack in Split Federated Learning. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 10184--10192 . Jingtao Li, Adnan Siraj Rakin, Xing Chen, Zhezhi He, Deliang Fan, and Chaitali Chakrabarti. 2022a. ResSFL: A Resistance Transfer Framework for Defending Model Inversion Attack in Split Federated Learning. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 10184--10192."},{"key":"e_1_3_2_1_22_1","volume-title":"Label Leakage and Protection in Two-party Split Learning. In The Tenth International Conference on Learning Representations. 1--27","author":"Li Oscar","year":"2022","unstructured":"Oscar Li , Jiankai Sun , Xin Yang , Weihao Gao , Hongyi Zhang , Junyuan Xie , Virginia Smith , and Chong Wang . 2022 b. Label Leakage and Protection in Two-party Split Learning. In The Tenth International Conference on Learning Representations. 1--27 . Oscar Li, Jiankai Sun, Xin Yang, Weihao Gao, Hongyi Zhang, Junyuan Xie, Virginia Smith, and Chong Wang. 2022b. Label Leakage and Protection in Two-party Split Learning. In The Tenth International Conference on Learning Representations. 1--27."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838867"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151670"},{"key":"e_1_3_2_1_26_1","volume-title":"Unleashing the Tiger: Inference Attacks on Split Learning. In 2021 ACM SIGSAC Conference on Computer and Communications Security. 2113--2129","author":"Pasquini Dario","year":"2021","unstructured":"Dario Pasquini , Giuseppe Ateniese , and Massimo Bernaschi . 2021 . Unleashing the Tiger: Inference Attacks on Split Learning. In 2021 ACM SIGSAC Conference on Computer and Communications Security. 2113--2129 . Dario Pasquini, Giuseppe Ateniese, and Massimo Bernaschi. 2021. Unleashing the Tiger: Inference Attacks on Split Learning. In 2021 ACM SIGSAC Conference on Computer and Communications Security. 2113--2129."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109380"},{"key":"e_1_3_2_1_28_1","volume-title":"Label Leakage and Protection from Forward Embedding in Vertical Federated Learning. CoRR","author":"Sun Jiankai","year":"2022","unstructured":"Jiankai Sun , Xin Yang , Yuanshun Yao , and Chong Wang . 2022a. Label Leakage and Protection from Forward Embedding in Vertical Federated Learning. CoRR , Vol. abs\/ 2203 .01451 ( 2022 ), 1--17. Jiankai Sun, Xin Yang, Yuanshun Yao, and Chong Wang. 2022a. Label Leakage and Protection from Forward Embedding in Vertical Federated Learning. CoRR, Vol. abs\/2203.01451 (2022), 1--17."},{"key":"e_1_3_2_1_29_1","volume-title":"Label Leakage and Protection from Forward Embedding in Vertical Federated Learning. CoRR","author":"Sun Jiankai","year":"2022","unstructured":"Jiankai Sun , Xin Yang , Yuanshun Yao , and Chong Wang . 2022b. Label Leakage and Protection from Forward Embedding in Vertical Federated Learning. CoRR , Vol. abs\/ 2203 .01451 ( 2022 ), 1--17. Jiankai Sun, Xin Yang, Yuanshun Yao, and Chong Wang. 2022b. Label Leakage and Protection from Forward Embedding in Vertical Federated Learning. CoRR, Vol. abs\/2203.01451 (2022), 1--17."},{"key":"e_1_3_2_1_30_1","unstructured":"Differential Privacy Team. 2017. Learning with Privacy at Scale. https:\/\/machinelearning.apple.com\/research\/learning-with-privacy-at-scale.  Differential Privacy Team. 2017. Learning with Privacy at Scale. https:\/\/machinelearning.apple.com\/research\/learning-with-privacy-at-scale."},{"key":"e_1_3_2_1_31_1","volume-title":"SplitFed: When Federated Learning Meets Split Learning. In Thirty-Sixth AAAI Conference on Artificial Intelligence. 8485--8493","author":"Thapa Chandra","year":"2022","unstructured":"Chandra Thapa , Mahawaga Arachchige Pathum Chamikara , Seyit Camtepe , and Lichao Sun . 2022 . SplitFed: When Federated Learning Meets Split Learning. In Thirty-Sixth AAAI Conference on Artificial Intelligence. 8485--8493 . Chandra Thapa, Mahawaga Arachchige Pathum Chamikara, Seyit Camtepe, and Lichao Sun. 2022. SplitFed: When Federated Learning Meets Split Learning. In Thirty-Sixth AAAI Conference on Artificial Intelligence. 8485--8493."},{"key":"e_1_3_2_1_32_1","volume-title":"Spectral Signatures in Backdoor Attacks. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems","author":"Tran Brandon","year":"2018","unstructured":"Brandon Tran , Jerry Li , and Aleksander Madry . 2018 . Spectral Signatures in Backdoor Attacks. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2019. 8011--8021. Brandon Tran, Jerry Li, and Aleksander Madry. 2018. Spectral Signatures in Backdoor Attacks. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2019. 8011--8021."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD53861.2021.00038"},{"key":"e_1_3_2_1_34_1","volume-title":"Split learning for health: Distributed deep learning without sharing raw patient data. CoRR","author":"Vepakomma Praneeth","year":"2018","unstructured":"Praneeth Vepakomma , Otkrist Gupta , Tristan Swedish , and Ramesh Raskar . 2018. Split learning for health: Distributed deep learning without sharing raw patient data. CoRR , Vol. abs\/ 1812 .00564 ( 2018 ), 1--7. Praneeth Vepakomma, Otkrist Gupta, Tristan Swedish, and Ramesh Raskar. 2018. Split learning for health: Distributed deep learning without sharing raw patient data. CoRR, Vol. abs\/1812.00564 (2018), 1--7."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW51313.2020.00134"},{"key":"e_1_3_2_1_36_1","volume-title":"Split Federated Learning for Emotion Detection. In 4th Novel Intelligent and Leading Emerging Sciences Conference. 112--115","author":"Waref Dinah","year":"2022","unstructured":"Dinah Waref and Mohammed Salem . 2022 . Split Federated Learning for Emotion Detection. In 4th Novel Intelligent and Leading Emerging Sciences Conference. 112--115 . Dinah Waref and Mohammed Salem. 2022. Split Federated Learning for Emotion Detection. In 4th Novel Intelligent and Leading Emerging Sciences Conference. 112--115."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_3_2_1_38_1","first-page":"3165","article-title":"Mixing Activations and Labels in Distributed Training for Split Learning","volume":"33","author":"Xiao Danyang","year":"2022","unstructured":"Danyang Xiao , Chengang Yang , and Weigang Wu . 2022 . Mixing Activations and Labels in Distributed Training for Split Learning . IEEE Transactions on Parallel and Distributed Systems , Vol. 33 , 11 (2022), 3165 -- 3177 . Danyang Xiao, Chengang Yang, and Weigang Wu. 2022. Mixing Activations and Labels in Distributed Training for Split Learning. IEEE Transactions on Parallel and Distributed Systems, Vol. 33, 11 (2022), 3165--3177.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning. 11420--11435","author":"Zheng Qinqing","unstructured":"Qinqing Zheng , Jinshuo Dong , Qi Long , and Weijie J. Su . 2020. Sharp Composition Bounds for Gaussian Differential Privacy via Edgeworth Expansion . In Proceedings of the 37th International Conference on Machine Learning. 11420--11435 . Qinqing Zheng, Jinshuo Dong, Qi Long, and Weijie J. Su. 2020. Sharp Composition Bounds for Gaussian Differential Privacy via Edgeworth Expansion. In Proceedings of the 37th International Conference on Machine Learning. 11420--11435."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538641.3561500"}],"event":{"name":"CIKM '23: The 32nd ACM International Conference on Information and Knowledge Management","location":"Birmingham United Kingdom","acronym":"CIKM '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 32nd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3615019","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583780.3615019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:55Z","timestamp":1750178215000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3615019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,21]]},"references-count":40,"alternative-id":["10.1145\/3583780.3615019","10.1145\/3583780"],"URL":"https:\/\/doi.org\/10.1145\/3583780.3615019","relation":{},"subject":[],"published":{"date-parts":[[2023,10,21]]},"assertion":[{"value":"2023-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}