{"id":"https://openalex.org/W7127401002","doi":"https://doi.org/10.1109/tetci.2026.3657969","title":"Neuron Membership Inference Attack in Federated Learning for bit Scenarios","display_name":"Neuron Membership Inference Attack in Federated Learning for bit Scenarios","publication_year":2026,"publication_date":"2026-02-03","ids":{"openalex":"https://openalex.org/W7127401002","doi":"https://doi.org/10.1109/tetci.2026.3657969"},"language":null,"primary_location":{"id":"doi:10.1109/tetci.2026.3657969","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetci.2026.3657969","pdf_url":null,"source":{"id":"https://openalex.org/S4210210251","display_name":"IEEE Transactions on Emerging Topics in Computational Intelligence","issn_l":"2471-285X","issn":["2471-285X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computational Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119516824","display_name":"Ruihong Xiu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210094876","display_name":"Ministry of Education","ror":"https://ror.org/00q919b81","country_code":"SA","type":"government","lineage":["https://openalex.org/I4210094876"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Ruihong Xiu","raw_affiliation_strings":["Key Laboratory of Dependable Services Computing in Cyber Physical &amp; Society-Ministry of Education, College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Dependable Services Computing in Cyber Physical &amp; Society-Ministry of Education, College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I4210094876"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063299510","display_name":"Junqing Le","orcid":"https://orcid.org/0000-0003-2240-5263"},"institutions":[{"id":"https://openalex.org/I4210094876","display_name":"Ministry of Education","ror":"https://ror.org/00q919b81","country_code":"SA","type":"government","lineage":["https://openalex.org/I4210094876"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Junqing Le","raw_affiliation_strings":["Key Laboratory of Dependable Services Computing in Cyber Physical &amp; Society-Ministry of Education, College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Dependable Services Computing in Cyber Physical &amp; Society-Ministry of Education, College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I4210094876"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124946471","display_name":"Di Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210094876","display_name":"Ministry of Education","ror":"https://ror.org/00q919b81","country_code":"SA","type":"government","lineage":["https://openalex.org/I4210094876"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Di Zhang","raw_affiliation_strings":["Key Laboratory of Dependable Services Computing in Cyber Physical &amp; Society-Ministry of Education, College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Dependable Services Computing in Cyber Physical &amp; Society-Ministry of Education, College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I4210094876"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124969292","display_name":"Xiaofeng Liao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210094876","display_name":"Ministry of Education","ror":"https://ror.org/00q919b81","country_code":"SA","type":"government","lineage":["https://openalex.org/I4210094876"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Xiaofeng Liao","raw_affiliation_strings":["Key Laboratory of Dependable Services Computing in Cyber Physical &amp; Society-Ministry of Education, College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Dependable Services Computing in Cyber Physical &amp; Society-Ministry of Education, College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I4210094876"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5119516824"],"corresponding_institution_ids":["https://openalex.org/I4210094876"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30682399,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"2","first_page":"1849","last_page":"1862"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9484999775886536,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9484999775886536,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.00860000029206276,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.004399999976158142,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6797000169754028},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6607000231742859},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.6450999975204468},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5870000123977661},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.5159000158309937},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.49050000309944153},{"id":"https://openalex.org/keywords/randomized-response","display_name":"Randomized response","score":0.4406000077724457},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4375}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8425999879837036},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6797000169754028},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6607000231742859},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.6450999975204468},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5870000123977661},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5616000294685364},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.5159000158309937},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.49050000309944153},{"id":"https://openalex.org/C2776441110","wikidata":"https://www.wikidata.org/wiki/Q1436628","display_name":"Randomized response","level":3,"score":0.4406000077724457},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4375},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4287000000476837},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.41760000586509705},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.40230000019073486},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.3856000006198883},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.36320000886917114},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33550000190734863},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.3337000012397766},{"id":"https://openalex.org/C117011727","wikidata":"https://www.wikidata.org/wiki/Q1278488","display_name":"Bit (key)","level":2,"score":0.3303999900817871},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.32260000705718994},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3027999997138977},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.2854999899864197},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.2806999981403351},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.27399998903274536},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.2612000107765198},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tetci.2026.3657969","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetci.2026.3657969","pdf_url":null,"source":{"id":"https://openalex.org/S4210210251","display_name":"IEEE Transactions on Emerging Topics in Computational Intelligence","issn_l":"2471-285X","issn":["2471-285X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computational Intelligence","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7644360661506653,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0],"learning":[1,46,157],"(FL)":[2],"is":[3,32,188],"a":[4,61],"secure":[5],"approach":[6],"to":[7,22,35,155,213],"protecting":[8],"client":[9,82,119],"data":[10,14],"privacy":[11,31,53,83,147],"by":[12,96],"remaining":[13],"local.":[15],"However,":[16],"semi-honest":[17,70],"central":[18,71],"servers":[19,72],"expose":[20],"clients":[21,112],"the":[23,42,50,106,110,124,127,136,139,193,203,216,225],"risk":[24,51],"of":[25,52,109,126,138,178,211,227],"membership":[26,64],"inference":[27,65,89],"attacks":[28],"(MIA).":[29],"Differential":[30],"often":[33],"used":[34],"defend":[36],"against":[37],"MIA":[38],"in":[39,99,142,185],"FL,":[40],"but":[41],"differential":[43,146],"privacy-based":[44],"federated":[45,156],"(DP-FL)":[47],"still":[48,201],"faces":[49],"leakage":[54],"for":[55,123,150,158],"bit":[56,74,143,159,186],"scenarios.":[57],"This":[58],"paper":[59],"designs":[60],"novel":[62],"neuron":[63],"attack":[66,90,103,176,183,195,209],"(NMIA)":[67],"strategy":[68,141],"under":[69],"and":[73,80,113],"scenarios,":[75,144],"which":[76],"can":[77,169,200,220],"compromise":[78],"DP-FL":[79],"obtain":[81],"information.":[84],"Specifically,":[85],"NMIA":[86,128,140,168,199,223],"generates":[87],"an":[88,175,208],"model":[91,104],"with":[92,207],"low":[93],"computational":[94],"overhead":[95],"training":[97],"only":[98,221],"small-scale":[100],"neurons.":[101],"The":[102],"analyzes":[105],"gradient":[107],"outputs":[108],"FL":[111,229],"effectively":[114],"infers":[115],"information":[116],"about":[117,189],"specific":[118],"data.":[120],"Sufficient":[121],"conditions":[122],"success":[125],"have":[129],"been":[130],"theoretically":[131],"proven.":[132],"To":[133],"comprehensively":[134],"evaluate":[135],"performance":[137],"two":[145],"protection":[148],"methods":[149],"randomized":[151],"response":[152],"encoding":[153,205,218],"applicable":[154],"scenarios":[160,187],"(BDP-FL)":[161],"are":[162],"proposed.":[163],"Experimental":[164],"results":[165],"show":[166],"that":[167],"easily":[170],"defeat":[171,202],"traditional":[172],"DP-FL,":[173],"achieving":[174],"accuracy":[177,184,210],"over":[179],"99%,":[180],"while":[181,215],"NMIA\u2019s":[182],"20%":[190],"higher":[191],"than":[192],"existing":[194],"strategies.":[196],"In":[197],"addition,":[198],"optimized":[204],"BDP-FL":[206,219],"up":[212],"90%,":[214],"symmetric":[217],"mitigate":[222],"at":[224],"cost":[226],"severe":[228],"utility":[230],"loss.":[231]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-02-04T00:00:00"}
