{"id":"https://openalex.org/W4280598278","doi":"https://doi.org/10.1007/s10586-022-03596-1","title":"An empirical analysis of image augmentation against model inversion attack in federated learning","display_name":"An empirical analysis of image augmentation against model inversion attack in federated learning","publication_year":2022,"publication_date":"2022-05-14","ids":{"openalex":"https://openalex.org/W4280598278","doi":"https://doi.org/10.1007/s10586-022-03596-1"},"language":"en","primary_location":{"id":"doi:10.1007/s10586-022-03596-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-022-03596-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10586-022-03596-1.pdf","source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10586-022-03596-1.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076495774","display_name":"Seunghyeon Shin","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Seunghyeon Shin","raw_affiliation_strings":["Department of Computer Science, Kennesaw State University, 1100 South Marietta Pkwy, Marietta, 30060, GA, USA","Information and Intelligent Security (IIS) Laboratory, Kennesaw State University, 1100 South Marietta Pkwy, Marietta, 30060, GA, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kennesaw State University, 1100 South Marietta Pkwy, Marietta, 30060, GA, USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Information and Intelligent Security (IIS) Laboratory, Kennesaw State University, 1100 South Marietta Pkwy, Marietta, 30060, GA, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001954588","display_name":"Mallika Boyapati","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mallika Boyapati","raw_affiliation_strings":["Information and Intelligent Security (IIS) Laboratory, Kennesaw State University, 1100 South Marietta Pkwy, Marietta, 30060, GA, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information and Intelligent Security (IIS) Laboratory, Kennesaw State University, 1100 South Marietta Pkwy, Marietta, 30060, GA, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054721271","display_name":"Kun Suo","orcid":"https://orcid.org/0000-0001-8562-0492"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kun Suo","raw_affiliation_strings":["Department of Computer Science, Kennesaw State University, 1100 South Marietta Pkwy, Marietta, 30060, GA, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kennesaw State University, 1100 South Marietta Pkwy, Marietta, 30060, GA, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040618550","display_name":"Kyungtae Kang","orcid":null},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kyungtae Kang","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, 55 Hanyangdeahak-ro, Ansan, 15588, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, 55 Hanyangdeahak-ro, Ansan, 15588, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079998325","display_name":"Junggab Son","orcid":"https://orcid.org/0000-0002-6206-083X"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Junggab Son","raw_affiliation_strings":["Department of Computer Science, Kennesaw State University, 1100 South Marietta Pkwy, Marietta, 30060, GA, USA","Information and Intelligent Security (IIS) Laboratory, Kennesaw State University, 1100 South Marietta Pkwy, Marietta, 30060, GA, USA"],"raw_orcid":"https://orcid.org/0000-0002-6206-083X","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kennesaw State University, 1100 South Marietta Pkwy, Marietta, 30060, GA, USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Information and Intelligent Security (IIS) Laboratory, Kennesaw State University, 1100 South Marietta Pkwy, Marietta, 30060, GA, USA","institution_ids":["https://openalex.org/I172980758"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5076495774"],"corresponding_institution_ids":["https://openalex.org/I172980758"],"apc_list":{"value":2190,"currency":"EUR","value_usd":2790},"apc_paid":{"value":2190,"currency":"EUR","value_usd":2790},"fwci":0.9711,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.79250703,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"26","issue":"1","first_page":"349","last_page":"366"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9448999762535095,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9211763143539429},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8642510175704956},{"id":"https://openalex.org/keywords/inversion","display_name":"Inversion (geology)","score":0.5787834525108337},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5720670819282532},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5592355132102966},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5402351021766663},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5199393033981323},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.48535338044166565},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.4386959671974182},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4263036251068115},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.4245131015777588},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4218483567237854},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3926229178905487},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35270369052886963},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27033743262290955}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9211763143539429},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8642510175704956},{"id":"https://openalex.org/C1893757","wikidata":"https://www.wikidata.org/wiki/Q3653001","display_name":"Inversion (geology)","level":3,"score":0.5787834525108337},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5720670819282532},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5592355132102966},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5402351021766663},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5199393033981323},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.48535338044166565},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.4386959671974182},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4263036251068115},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.4245131015777588},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4218483567237854},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3926229178905487},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35270369052886963},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27033743262290955},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C109007969","wikidata":"https://www.wikidata.org/wiki/Q749565","display_name":"Structural basin","level":2,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s10586-022-03596-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-022-03596-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10586-022-03596-1.pdf","source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},{"id":"pmh:oai:digitalcommons.kennesaw.edu:facpubs-7328","is_oa":false,"landing_page_url":"https://digitalcommons.kennesaw.edu/facpubs/6164","pdf_url":null,"source":{"id":"https://openalex.org/S4377196456","display_name":"DigitalCommons - Kennesaw State University (Kennesaw State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172980758","host_organization_name":"Kennesaw State University","host_organization_lineage":["https://openalex.org/I172980758"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty Articles","raw_type":"text"},{"id":"pmh:oai:digitalcommons.kennesaw.edu:facpubs-7753","is_oa":false,"landing_page_url":"https://digitalcommons.kennesaw.edu/facpubs/6577","pdf_url":null,"source":{"id":"https://openalex.org/S4377196456","display_name":"DigitalCommons - Kennesaw State University (Kennesaw State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172980758","host_organization_name":"Kennesaw State University","host_organization_lineage":["https://openalex.org/I172980758"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty and Research Publications","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1007/s10586-022-03596-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-022-03596-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10586-022-03596-1.pdf","source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.47999998927116394,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4280598278.pdf","grobid_xml":"https://content.openalex.org/works/W4280598278.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W1873763122","https://openalex.org/W2051267297","https://openalex.org/W2053637704","https://openalex.org/W2123820077","https://openalex.org/W2473418344","https://openalex.org/W2535690855","https://openalex.org/W2585635281","https://openalex.org/W2594311007","https://openalex.org/W2895805829","https://openalex.org/W2949736877","https://openalex.org/W2954996726","https://openalex.org/W2963313259","https://openalex.org/W2970408908","https://openalex.org/W2982014123","https://openalex.org/W2989885118","https://openalex.org/W2998508940","https://openalex.org/W3027749727","https://openalex.org/W3034600949","https://openalex.org/W3035616549","https://openalex.org/W3035682985","https://openalex.org/W3047916742","https://openalex.org/W3087801137","https://openalex.org/W6600160247","https://openalex.org/W6600223405","https://openalex.org/W6600270888","https://openalex.org/W6603827241","https://openalex.org/W6604385074","https://openalex.org/W6657138077"],"related_works":["https://openalex.org/W4286971788","https://openalex.org/W3199340467","https://openalex.org/W3157608626","https://openalex.org/W3132132958","https://openalex.org/W4321612632","https://openalex.org/W4322580403","https://openalex.org/W3193217249","https://openalex.org/W4280591108","https://openalex.org/W3021849752","https://openalex.org/W3010781909"],"abstract_inverted_index":{"Abstract":[0],"Federated":[1],"Learning":[2],"(FL)":[3],"is":[4,42,62],"a":[5,9,35,77,120,143],"technology":[6],"that":[7,40,65,96,142],"facilitates":[8],"sophisticated":[10],"way":[11],"to":[12,44,68],"train":[13],"distributed":[14],"data.":[15],"As":[16,119],"the":[17,25,46,51,59,86,101,108,122,134],"FL":[18],"does":[19],"not":[20],"expose":[21,45],"sensitive":[22],"data":[23,48,60],"in":[24,133],"training":[26],"process,":[27],"it":[28,41,74],"was":[29,136],"considered":[30],"privacy-safe":[31],"deep":[32],"learning.":[33],"However,":[34],"few":[36],"recent":[37],"studies":[38],"proved":[39],"possible":[43],"hidden":[47],"by":[49],"exploiting":[50],"shared":[52],"models":[53],"only.":[54],"One":[55],"common":[56],"solution":[57],"for":[58,129],"exposure":[61],"differential":[63,149],"privacy":[64,80],"adds":[66],"noise":[67],"hinder":[69],"such":[70],"an":[71,92],"attack,":[72],"however,":[73],"inevitably":[75],"involves":[76],"trade-off":[78],"between":[79],"and":[81,110,116,127],"utility.":[82],"This":[83],"paper":[84],"demonstrates":[85],"effectiveness":[87],"of":[88,100,125],"image":[89,131],"augmentation":[90,126,145],"as":[91],"alternative":[93],"defense":[94],"strategy":[95,146],"has":[97],"less":[98],"impact":[99],"trade-off.":[102],"We":[103],"conduct":[104],"comprehensive":[105],"experiments":[106],"on":[107],"CIFAR-10":[109],"CIFAR-100":[111],"datasets":[112,135],"with":[113],"14":[114],"augmentations":[115],"9":[117],"magnitudes.":[118],"result,":[121],"best":[123],"combination":[124],"magnitude":[128],"each":[130],"class":[132],"discovered.":[137],"Also,":[138],"our":[139],"results":[140],"show":[141],"well-fitted":[144],"can":[147],"outperform":[148],"privacy.":[150]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
