{"id":"https://openalex.org/W7106626782","doi":"https://doi.org/10.1109/jiot.2025.3636944","title":"Unifying Gradient Leakage Attacks Against Privacy-Protected Federated Learning in IoT Networks","display_name":"Unifying Gradient Leakage Attacks Against Privacy-Protected Federated Learning in IoT Networks","publication_year":2025,"publication_date":"2025-11-25","ids":{"openalex":"https://openalex.org/W7106626782","doi":"https://doi.org/10.1109/jiot.2025.3636944"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3636944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3636944","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Hui Zhou","orcid":"https://orcid.org/0000-0002-2589-4384"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hui Zhou","raw_affiliation_strings":["College of Cyber Science and Technology, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Science and Technology, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zheng Qin","orcid":"https://orcid.org/0000-0003-0877-3887"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Qin","raw_affiliation_strings":["College of Cyber Science and Technology, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Science and Technology, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Peng Sun","orcid":"https://orcid.org/0000-0001-6221-8142"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Sun","raw_affiliation_strings":["College of Computer Science, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xin Deng","orcid":"https://orcid.org/0009-0007-9321-4540"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Deng","raw_affiliation_strings":["College of Computer Science, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yipeng Zou","orcid":"https://orcid.org/0009-0009-8583-3557"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yipeng Zou","raw_affiliation_strings":["College of Computer Science, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"last","author":{"id":null,"display_name":"Xiaoshuai Wu","orcid":"https://orcid.org/0000-0001-6241-3546"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoshuai Wu","raw_affiliation_strings":["College of Cyber Science and Technology, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Science and Technology, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I16609230"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.77590628,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"4","first_page":"6564","last_page":"6574"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.6744999885559082,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.6744999885559082,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.16279999911785126,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.031199999153614044,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.7865999937057495},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5440000295639038},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.5227000117301941},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4885999858379364},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.47749999165534973},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.4390000104904175},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.43380001187324524},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.428600013256073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8416000008583069},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.7865999937057495},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5562999844551086},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5440000295639038},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.5227000117301941},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4885999858379364},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.47749999165534973},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.4390000104904175},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.43380001187324524},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.428600013256073},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.41449999809265137},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.3718000054359436},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.36239999532699585},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.32989999651908875},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.3165999948978424},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3138999938964844},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3095000088214874},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.296099990606308},{"id":"https://openalex.org/C70587473","wikidata":"https://www.wikidata.org/wiki/Q7834111","display_name":"Transformative learning","level":2,"score":0.26190000772476196},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.26010000705718994}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3636944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3636944","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7163763642311096}],"awards":[{"id":"https://openalex.org/G1364758715","display_name":null,"funder_award_id":"62102337","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4028485081","display_name":null,"funder_award_id":"CX20250632","funder_id":"https://openalex.org/F4320326217","funder_display_name":"Hunan Provincial Innovation Foundation for Postgraduate"},{"id":"https://openalex.org/G4434337290","display_name":null,"funder_award_id":"62472166","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G683624908","display_name":null,"funder_award_id":"62441233","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7739433689","display_name":null,"funder_award_id":"62472158","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7837195937","display_name":null,"funder_award_id":"U22A2030","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320326217","display_name":"Hunan Provincial Innovation Foundation for Postgraduate","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W2108598243","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2781091734","https://openalex.org/W2963446712","https://openalex.org/W3034352949","https://openalex.org/W3110068734","https://openalex.org/W3172312230","https://openalex.org/W3175192640","https://openalex.org/W3212010319","https://openalex.org/W4312809802","https://openalex.org/W4313396675","https://openalex.org/W4320013936","https://openalex.org/W4367359542","https://openalex.org/W4386025940","https://openalex.org/W4386053125","https://openalex.org/W4386260756","https://openalex.org/W4387068389","https://openalex.org/W4387789919","https://openalex.org/W4388145633","https://openalex.org/W4389352474","https://openalex.org/W4389722404","https://openalex.org/W4390871834","https://openalex.org/W4390938796","https://openalex.org/W4391620832","https://openalex.org/W4394862967","https://openalex.org/W4394939057","https://openalex.org/W4396723350","https://openalex.org/W4399938968","https://openalex.org/W4401163800","https://openalex.org/W4401508055","https://openalex.org/W4401508561","https://openalex.org/W4402978375","https://openalex.org/W4404294137","https://openalex.org/W4405182454","https://openalex.org/W4406137434","https://openalex.org/W4407168550","https://openalex.org/W4408519685","https://openalex.org/W4409362364","https://openalex.org/W4410226386","https://openalex.org/W4412352617","https://openalex.org/W4413344004"],"related_works":[],"abstract_inverted_index":{"Federated":[0],"learning":[1],"(FL)":[2],"is":[3],"a":[4,110,154,163],"transformative":[5],"paradigm":[6],"for":[7,96,147,159,192],"the":[8,52,180,190],"Internet":[9],"of":[10],"Things":[11],"(IoT),":[12],"enabling":[13],"decentralized":[14],"model":[15],"training":[16,67],"across":[17,175],"distributed":[18],"IoT":[19,38,197],"devices":[20],"while":[21],"reducing":[22],"reliance":[23],"on":[24],"centralized":[25],"data":[26,68,151],"collection.":[27],"Crucially,":[28],"FL":[29,121,177],"cuts":[30],"communication":[31],"overhead,":[32],"an":[33],"essential":[34],"benefit":[35],"in":[36,120,196],"bandwidth-limited":[37],"environments.":[39],"However,":[40],"repeated":[41],"gradient":[42,58,74,117,156],"exchanges":[43],"between":[44],"edge":[45],"clients":[46],"(e.g.,":[47],"sensors,":[48],"mobile":[49],"devices)":[50],"and":[51,82,100,142,149,161,170],"central":[53],"server":[54],"expose":[55],"vulnerabilities":[56],"to":[57,64,87,137],"leakage":[59],"attacks":[60],"(GLAs),":[61],"allowing":[62],"adversaries":[63],"reconstruct":[65],"private":[66],"from":[69],"shared":[70],"gradients.":[71],"While":[72],"various":[73,176],"protection":[75,98,118,187],"strategies,":[76],"such":[77],"as":[78],"differential":[79],"privacy,":[80],"sparsification,":[81],"clipping,":[83],"have":[84],"been":[85],"introduced":[86],"mitigate":[88],"this":[89,106],"risk,":[90],"most":[91],"existing":[92],"GLAs":[93],"are":[94],"designed":[95],"specific":[97],"schemes":[99],"fail":[101],"under":[102,185],"heterogeneous":[103],"deployments.":[104],"In":[105],"work,":[107],"we":[108],"propose":[109],"unified":[111],"GLA":[112],"framework":[113],"that":[114,166],"targets":[115],"diverse":[116],"techniques":[119],"systems.":[122],"Our":[123],"approach":[124],"tackles":[125],"two":[126],"core":[127],"challenges:":[128],"(i)":[129],"aligning":[130],"protected":[131],"gradients":[132],"with":[133],"their":[134],"raw":[135],"counterparts":[136],"enable":[138],"robust":[139,193],"feature":[140,164],"extraction,":[141],"(ii)":[143],"identifying":[144],"critical":[145],"features":[146],"efficient":[148],"accurate":[150],"reconstruction.We":[152],"introduce":[153],"Taylor-based":[155],"approximation":[157],"method":[158],"alignment":[160],"design":[162],"reconstructor":[165],"enhances":[167],"both":[168],"performance":[169],"computational":[171],"efficiency.":[172],"Extensive":[173],"experiments":[174],"scenarios":[178],"demonstrate":[179],"framework\u2019s":[181],"superior":[182],"reconstruction":[183],"capability":[184],"different":[186],"schemes,":[188],"emphasizing":[189],"need":[191],"privacy-preserving":[194],"mechanisms":[195],"networks.":[198]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-25T00:00:00"}
