{"id":"https://openalex.org/W4386232222","doi":"https://doi.org/10.1109/tifs.2023.3309095","title":"Privacy-Encoded Federated Learning Against Gradient-Based Data Reconstruction Attacks","display_name":"Privacy-Encoded Federated Learning Against Gradient-Based Data Reconstruction Attacks","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4386232222","doi":"https://doi.org/10.1109/tifs.2023.3309095"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3309095","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3309095","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101987911","display_name":"Hongfu Liu","orcid":"https://orcid.org/0000-0002-3543-9916"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongfu Liu","raw_affiliation_strings":["School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-3543-9916","affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365151","display_name":"Bin Li","orcid":"https://orcid.org/0000-0002-1998-819X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Li","raw_affiliation_strings":["School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-1998-819X","affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101238444","display_name":"Changlong Gao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Changlong Gao","raw_affiliation_strings":["China Aneng Construction Group Corporation Ltd., Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Aneng Construction Group Corporation Ltd., Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100615809","display_name":"Pei Xie","orcid":"https://orcid.org/0000-0001-9804-5765"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pei Xie","raw_affiliation_strings":["China Aneng Construction Group Corporation Ltd., Beijing, China","China Aneng Construction Group Corporation Limited, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Aneng Construction Group Corporation Ltd., Beijing, China","institution_ids":[]},{"raw_affiliation_string":"China Aneng Construction Group Corporation Limited, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101832765","display_name":"Chenglin Zhao","orcid":"https://orcid.org/0000-0002-4270-5717"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenglin Zhao","raw_affiliation_strings":["School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-4270-5717","affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101987911"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":3.0674,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.93118851,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"18","issue":null,"first_page":"5860","last_page":"5875"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.980400025844574,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9743000268936157,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8811184167861938},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8183465003967285},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5273688435554504},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.5112693309783936},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4756086468696594},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.47521644830703735},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4626719653606415},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4560307562351227},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34615159034729004},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3440929651260376},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3368704915046692},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33046552538871765},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26477473974227905},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.23188933730125427}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8811184167861938},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8183465003967285},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5273688435554504},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.5112693309783936},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4756086468696594},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.47521644830703735},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4626719653606415},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4560307562351227},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34615159034729004},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3440929651260376},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3368704915046692},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33046552538871765},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26477473974227905},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.23188933730125427},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3309095","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3309095","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7313154043","display_name":null,"funder_award_id":"U61971050","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7872219757","display_name":null,"funder_award_id":"U1805262","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":63,"referenced_works":["https://openalex.org/W1686810756","https://openalex.org/W1998269045","https://openalex.org/W2018089423","https://openalex.org/W2031533839","https://openalex.org/W2064076387","https://openalex.org/W2112796928","https://openalex.org/W2405578611","https://openalex.org/W2507631131","https://openalex.org/W2525543902","https://openalex.org/W2535838896","https://openalex.org/W2541884796","https://openalex.org/W2606891064","https://openalex.org/W2734408173","https://openalex.org/W2767079719","https://openalex.org/W2774000609","https://openalex.org/W2781091734","https://openalex.org/W2785456003","https://openalex.org/W2932097000","https://openalex.org/W2955023110","https://openalex.org/W2970408908","https://openalex.org/W2972714212","https://openalex.org/W2977797911","https://openalex.org/W3000479830","https://openalex.org/W3006403184","https://openalex.org/W3016632787","https://openalex.org/W3018397821","https://openalex.org/W3027090184","https://openalex.org/W3101036738","https://openalex.org/W3112632687","https://openalex.org/W3118868694","https://openalex.org/W3132138018","https://openalex.org/W3154373807","https://openalex.org/W3157909872","https://openalex.org/W3172312230","https://openalex.org/W3175663678","https://openalex.org/W3176786489","https://openalex.org/W3188554269","https://openalex.org/W3192880923","https://openalex.org/W3216713600","https://openalex.org/W4226392654","https://openalex.org/W4230874317","https://openalex.org/W4287822453","https://openalex.org/W4297687186","https://openalex.org/W4298221930","https://openalex.org/W4318619660","https://openalex.org/W4363675749","https://openalex.org/W6631660994","https://openalex.org/W6631943919","https://openalex.org/W6637373629","https://openalex.org/W6683682940","https://openalex.org/W6725460582","https://openalex.org/W6728757088","https://openalex.org/W6746720608","https://openalex.org/W6746839373","https://openalex.org/W6747855403","https://openalex.org/W6748579526","https://openalex.org/W6761839128","https://openalex.org/W6773039429","https://openalex.org/W6775563089","https://openalex.org/W6776213126","https://openalex.org/W6784311791","https://openalex.org/W6794685599","https://openalex.org/W6796672819"],"related_works":["https://openalex.org/W2019704260","https://openalex.org/W2900631219","https://openalex.org/W4391095118","https://openalex.org/W4212899026","https://openalex.org/W4390570329","https://openalex.org/W2795052735","https://openalex.org/W2603823019","https://openalex.org/W2758544064","https://openalex.org/W3010824232","https://openalex.org/W4286750579"],"abstract_inverted_index":{"Federated":[0],"learning":[1,276],"(FL)":[2],"enables":[3],"multiple":[4,129,153],"local":[5,60,162],"clients":[6],"to":[7,76,99,170,176,235],"collaboratively":[8],"train":[9],"a":[10,59,90,135,171,197,262],"global":[11,172,179],"model,":[12],"which":[13,132,174],"can":[14,72],"reduce":[15],"privacy":[16,68],"leakage":[17,38],"by":[18,54,139,219,254],"sharing":[19],"model":[20,56,83,108,125,146,180,190,232],"parameters":[21,57,191],"instead":[22],"of":[23,113,121,185,200,206,215,224],"private":[24,52],"datasets.":[25],"However,":[26],"recent":[27],"works":[28],"have":[29],"revealed":[30],"that":[31,116],"gradient-based":[32],"data":[33,102,225,249,253],"reconstruction":[34,103,226],"attacks,":[35],"e.g.,":[36,66],"deep":[37],"from":[39,58],"gradients":[40,47,147],"(DLG),":[41],"improved":[42],"DLG":[43],"(iDLG),":[44],"and":[45,148,192,204,250],"inverting":[46],"(IG),":[48],"may":[49],"still":[50],"reveal":[51],"information":[53],"exploiting":[55],"client.":[61],"Current":[62],"privacy-preserving":[63,92,266],"FL":[64,93,97],"strategies,":[65],"differential":[67],"or":[69],"gradient":[70],"compression,":[71],"handle":[73],"such":[74,101],"attacks":[75,104,227],"some":[77],"extent,":[78],"but":[79,164],"seriously":[80],"sacrifice":[81],"their":[82],"accuracy.":[84,260],"In":[85],"this":[86],"work,":[87],"we":[88],"propose":[89],"novel":[91,136],"method,":[94],"named":[95],"privacy-encoded":[96,137],"(PEFL),":[98],"combat":[100],"without":[105,256],"degrading":[106,230],"the":[107,122,161,178,183,186,189,201,213,222,231,238,242,247,251,258],"performance.":[109,233],"The":[110],"key":[111],"concept":[112],"PEFL":[114,240],"is":[115,126],"each":[117],"large":[118],"weight":[119],"matrix":[120],"neural":[123],"network":[124],"decomposed":[127],"into":[128],"cascading":[130],"sub-matrices,":[131],"thus":[133],"establishes":[134],"mechanism":[138],"introducing":[140],"an":[141],"entangling":[142],"nonlinear":[143],"mapping":[144],"between":[145,188,246],"raw":[149,193,252],"data.":[150,194],"As":[151,209,261],"such,":[152],"sub-matrices":[154,167],"are":[155,168],"directly":[156],"trained":[157],"in":[158,274],"parallel":[159],"at":[160],"clients,":[163],"only":[165],"partial":[166],"reported":[169],"server,":[173],"suffices":[175],"reconstruct":[177],"whilst":[181],"increasing":[182],"complexity":[184,205],"coupling":[187],"We":[195],"provide":[196],"detailed":[198],"analysis":[199],"accuracy,":[202],"security,":[203],"our":[207,268],"method.":[208],"shown,":[210],"it":[211],"breaks":[212],"limit":[214],"classical":[216,236],"defensive":[217],"methods,":[218],"significantly":[220],"reducing":[221],"risk":[223],"yet":[228],"not":[229],"Compared":[234],"defenses,":[237],"proposed":[239,269],"decreases":[241],"peak-signal-to-noise":[243],"ratio":[244],"(PSNR)":[245],"reconstructed":[248],"~20dB,":[255],"sacrificing":[257],"test":[259],"new":[263],"paradigm":[264],"for":[265],"FL,":[267],"method":[270],"has":[271],"great":[272],"potential":[273],"privacy-demanding":[275],"applications.":[277]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":8}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
