{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:47:58Z","timestamp":1757591278649,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"China NSF grant","award":["No. 62322206, 62132018, U2268204, 62025204, 62272307, 62372296"],"award-info":[{"award-number":["No. 62322206, 62132018, U2268204, 62025204, 62272307, 62372296"]}]},{"name":"National Key R&D Program of China","award":["No. 2022ZD0119100"],"award-info":[{"award-number":["No. 2022ZD0119100"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,25]]},"DOI":"10.1145\/3637528.3671663","type":"proceedings-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:55:12Z","timestamp":1724561712000},"page":"3574-3585","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Preventing Strategic Behaviors in Collaborative Inference for Vertical Federated Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3450-6486","authenticated-orcid":false,"given":"Yidan","family":"Xing","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5094-5331","authenticated-orcid":false,"given":"Zhenzhe","family":"Zheng","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0965-9058","authenticated-orcid":false,"given":"Fan","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"volume-title":"Social choice and individual values","author":"Arrow Kenneth J","key":"e_1_3_2_2_1_1","unstructured":"Kenneth J Arrow. 2012. Social choice and individual values. Vol. 12. Yale University Press."},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics. PMLR, 2938--2948","author":"Bagdasaryan Eugene","year":"2020","unstructured":"Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2020. How to backdoor federated learning. In Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics. PMLR, 2938--2948."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3326943.3327046"},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning. PMLR, 634--643","author":"Bhagoji Arjun Nitin","year":"2019","unstructured":"Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, and Seraphin Calo. 2019. Analyzing federated learning through an adversarial lens. In Proceedings of the 36th International Conference on Machine Learning. PMLR, 634--643."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467210"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387107"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539237"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488743"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i6.16669"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the 35th International Conference on Neural Information Processing Systems. Curran Associates Inc.","author":"Donahue Kate","year":"2021","unstructured":"Kate Donahue and Jon Kleinberg. 2021. Optimality and stability in federated learning: A game-theoretic approach. In Proceedings of the 35th International Conference on Neural Information Processing Systems. Curran Associates Inc., Red Hook, NY, USA, 1287--1298."},{"key":"e_1_3_2_2_11_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Fu Chong","year":"2022","unstructured":"Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X Liu, and Ting Wang. 2022. Label inference attacks against vertical federated learning. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, 1397--1414."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2188385.2188410"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD55607.2022.00064"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00355-009-0412-6"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the 11th International Conference on Learning Representations.","author":"Hron Jiri","year":"2022","unstructured":"Jiri Hron, Karl Krauth, Michael Jordan, Niki Kilbertus, and Sarah Dean. 2022. Modeling content creator incentives on algorithm-curated platforms. In Proceedings of the 11th International Conference on Learning Representations."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330765"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0262.2007.00737.x"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the 10th International Conference on Learning Representations.","author":"Li Oscar","year":"2022","unstructured":"Oscar Li, Jiankai Sun, Xin Yang, Weihao Gao, Hongyi Zhang, Junyuan Xie, Virginia Smith, and Chong Wang. 2022. Label Leakage and Protection in Two-party Split Learning. In Proceedings of the 10th International Conference on Learning Representations."},{"key":"e_1_3_2_2_20_1","volume-title":"Vertical semi-federated learning for efficient online advertising. arXiv preprint","author":"Li Wenjie","year":"2022","unstructured":"Wenjie Li, Qiaolin Xia, Hao Cheng, Kouyin Xue, and Shu-Tao Xia. 2022. Vertical semi-federated learning for efficient online advertising. arXiv preprint (2022). https:\/\/arxiv.org\/abs\/2209.15635"},{"volume-title":"Proceedings of the 37th International Conference on Machine Learning. PMLR, 6316--6326","author":"Liu Feng","key":"e_1_3_2_2_21_1","unstructured":"Feng Liu, Wenkai Xu, Jie Lu, Guangquan Zhang, Arthur Gretton, and Danica J. Sutherland. 2020. Learning Deep Kernels for Non-Parametric Two-Sample Tests. In Proceedings of the 37th International Conference on Machine Learning. PMLR, 6316--6326."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3352628"},{"key":"e_1_3_2_2_23_1","volume-title":"Backdoor attacks and defenses in feature-partitioned collaborative learning. arXiv preprint","author":"Liu Yang","year":"2020","unstructured":"Yang Liu, Zhihao Yi, and Tianjian Chen. 2020. Backdoor attacks and defenses in feature-partitioned collaborative learning. arXiv preprint (2020). https:\/\/arxiv.org\/abs\/2007.03608"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00023"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.23919\/WiOpt52861.2021.9589136"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jet.2010.03.014"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17093"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_2_29_1","volume-title":"ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems. In 2023 IEEE Symposium on Security and Privacy. IEEE Computer Society","author":"Pang Qi","year":"2023","unstructured":"Qi Pang, Yuanyuan Yuan, Shuai Wang, and Wenting Zheng. 2023. ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems. In 2023 IEEE Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos, CA, USA, 1875--1892."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-015-0461-x"},{"key":"e_1_3_2_2_31_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning. PMLR, 8927--8936","author":"Ling Sim Rachael Hwee","year":"2020","unstructured":"Rachael Hwee Ling Sim, Yehong Zhang, Mun Choon Chan, and Bryan Kian Hsiang Low. 2020. Collaborative machine learning with incentive-aware model rewards. In Proceedings of the 37th International Conference on Machine Learning. PMLR, 8927--8936."},{"volume-title":"Proceedings of the 32th International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 6769--6777","author":"Soltani Behnaz","key":"e_1_3_2_2_32_1","unstructured":"Behnaz Soltani, Yipeng Zhou, Venus Haghighi, and John C. S. Lui. 2023. A Survey of Federated Evaluation in Federated Learning. In Proceedings of the 32th International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 6769--6777."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488705"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1177\/2321022215577548"},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the 34th International Conference on Neural Information Processing Systems. Curran Associates Inc.","author":"Wang Hongyi","year":"2020","unstructured":"Hongyi Wang, Kartik Sreenivasan, Shashank Rajput, Harit Vishwakarma, Saurabh Agarwal, Jy-yong Sohn, Kangwook Lee, and Dimitris Papailiopoulos. 2020. Attack of the tails: Yes, you really can backdoor federated learning. In Proceedings of the 34th International Conference on Neural Information Processing Systems. Curran Associates Inc., Red Hook, NY, USA, 16070--16084."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591909"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3506715"},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the 8th International Conference on Learning Representations.","author":"Xie Chulin","year":"2020","unstructured":"Chulin Xie, Keli Huang, Pin Yu Chen, and Bo Li. 2020. DBA: Distributed Backdoor Attacks against Federated Learning. In Proceedings of the 8th International Conference on Learning Representations."},{"key":"e_1_3_2_2_40_1","first-page":"1035","article-title":"A survey of incentive mechanism design for federated learning","volume":"10","author":"Zhan Yufeng","year":"2022","unstructured":"Yufeng Zhan, Jie Zhang, Zicong Hong, Leijie Wu, Peng Li, and Song Guo. 2022. A survey of incentive mechanism design for federated learning. IEEE Transactions on Emerging Topics in Computing, Vol. 10, 2 (2022), 1035--1044.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3118423"}],"event":{"name":"KDD '24: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Barcelona Spain","acronym":"KDD '24"},"container-title":["Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671663","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637528.3671663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:00Z","timestamp":1750291560000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671663"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":41,"alternative-id":["10.1145\/3637528.3671663","10.1145\/3637528"],"URL":"https:\/\/doi.org\/10.1145\/3637528.3671663","relation":{},"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"2024-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}