{"id":"https://openalex.org/W3090107331","doi":"https://doi.org/10.1109/icccn49398.2020.9209744","title":"Beyond Model-Level Membership Privacy Leakage: an Adversarial Approach in Federated Learning","display_name":"Beyond Model-Level Membership Privacy Leakage: an Adversarial Approach in Federated Learning","publication_year":2020,"publication_date":"2020-08-01","ids":{"openalex":"https://openalex.org/W3090107331","doi":"https://doi.org/10.1109/icccn49398.2020.9209744","mag":"3090107331"},"language":"en","primary_location":{"id":"doi:10.1109/icccn49398.2020.9209744","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn49398.2020.9209744","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100696903","display_name":"Jiale Chen","orcid":"https://orcid.org/0009-0007-4658-5365"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiale Chen","raw_affiliation_strings":["Collage of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Collage of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100744176","display_name":"Jiale Zhang","orcid":"https://orcid.org/0000-0002-2143-5666"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiale Zhang","raw_affiliation_strings":["Collage of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Collage of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017359136","display_name":"Yanchao Zhao","orcid":"https://orcid.org/0000-0001-6314-0332"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanchao Zhao","raw_affiliation_strings":["Collage of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Collage of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101682487","display_name":"Hao Han","orcid":"https://orcid.org/0000-0002-7912-027X"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Han","raw_affiliation_strings":["Collage of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Collage of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000861569","display_name":"Kun Zhu","orcid":"https://orcid.org/0000-0001-6784-5583"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun Zhu","raw_affiliation_strings":["Collage of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Collage of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100443103","display_name":"Bing Chen","orcid":"https://orcid.org/0000-0002-2863-5441"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Chen","raw_affiliation_strings":["Collage of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Collage of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100696903"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":2.121,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.89879569,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8750576972961426},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6544805765151978},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.573052704334259},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5117356777191162},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4293852150440216},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42266449332237244},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2552553415298462},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.06728905439376831},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.06578579545021057}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8750576972961426},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6544805765151978},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.573052704334259},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5117356777191162},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4293852150440216},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42266449332237244},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2552553415298462},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.06728905439376831},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.06578579545021057},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn49398.2020.9209744","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn49398.2020.9209744","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W114517082","https://openalex.org/W1992926795","https://openalex.org/W2007339694","https://openalex.org/W2031533839","https://openalex.org/W2053637704","https://openalex.org/W2125389028","https://openalex.org/W2535690855","https://openalex.org/W2535838896","https://openalex.org/W2541884796","https://openalex.org/W2591882872","https://openalex.org/W2777914285","https://openalex.org/W2781091734","https://openalex.org/W2786233556","https://openalex.org/W2795435272","https://openalex.org/W2798657499","https://openalex.org/W2799803467","https://openalex.org/W2807006176","https://openalex.org/W2808423829","https://openalex.org/W2910152480","https://openalex.org/W2912213068","https://openalex.org/W2916987143","https://openalex.org/W2962835266","https://openalex.org/W2963378725","https://openalex.org/W2964162474","https://openalex.org/W2964318098","https://openalex.org/W2970606380","https://openalex.org/W2982302101","https://openalex.org/W4291984345","https://openalex.org/W4297687186","https://openalex.org/W4298221930","https://openalex.org/W4318619660","https://openalex.org/W6675188600","https://openalex.org/W6678815747","https://openalex.org/W6718639682","https://openalex.org/W6728757088","https://openalex.org/W6746720608","https://openalex.org/W6747553010","https://openalex.org/W6750182894","https://openalex.org/W6750799548","https://openalex.org/W6752029299"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"With":[0],"the":[1,12,43,47,51,56,67,72,78,82,93,130,133,144,150,158,168,172,182,190],"rise":[2],"of":[3,46,122,132,184,192],"privacy":[4],"concerns":[5],"in":[6,34,112,129,189],"traditional":[7],"centralized":[8,83],"machine":[9,84],"learning":[10,49,85],"services,":[11],"federated":[13,48,113,134],"learning,":[14],"which":[15,165],"incorporates":[16],"multiple":[17],"participants":[18],"to":[19,66,91,95],"train":[20],"a":[21,61,96,106,119,139],"global":[22],"model":[23],"across":[24],"their":[25],"localized":[26],"training":[27,69,169],"data,":[28],"has":[29],"lately":[30],"received":[31],"signifi-cant":[32],"attention":[33],"both":[35],"industry":[36],"and":[37,124,194],"academia.":[38],"However,":[39],"recent":[40],"researches":[41],"reveal":[42],"inherent":[44],"vulnerabilities":[45],"for":[50,171],"membership":[52,79,94,126,174],"inference":[53,109,127,175],"attacks":[54,128],"that":[55,143],"adversary":[57,145],"could":[58,75],"infer":[59,92],"whether":[60],"given":[62],"data":[63],"record":[64],"belongs":[65],"model\u2019s":[68],"set.":[70],"Although":[71],"state-of-the-art":[73],"techniques":[74],"successfully":[76],"deduce":[77],"information":[80],"from":[81,153],"models,":[86],"it":[87],"is":[88],"still":[89],"challenging":[90],"more":[97,140],"confined":[98],"level,":[99],"user-level.":[100],"In":[101],"this":[102],"paper,":[103],"We":[104],"propose":[105],"novel":[107],"user-level":[108],"attack":[110],"mechanism":[111],"learning.":[114,135],"Specifically,":[115],"we":[116,156],"first":[117],"give":[118],"comprehensive":[120],"analysis":[121],"active":[123],"targeted":[125],"context":[131],"Then,":[136],"by":[137],"considering":[138],"complicated":[141],"scenario":[142],"can":[146,166],"only":[147],"passively":[148],"observe":[149],"updating":[151],"models":[152],"different":[154],"iterations,":[155],"incorporate":[157],"generative":[159],"adversarial":[160],"networks":[161],"into":[162],"our":[163,185],"method,":[164],"enrich":[167],"set":[170],"final":[173],"model.":[176],"The":[177],"extensive":[178],"experimental":[179],"results":[180],"demonstrate":[181],"effectiveness":[183],"proposed":[186],"attacking":[187],"approach":[188],"case":[191],"single-label":[193],"multi-label.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
