{"id":"https://openalex.org/W4415159168","doi":"https://doi.org/10.1109/tifs.2025.3621008","title":"Dual Dependency Disentangling for Defending Model Inversion Attacks in Split Federated Learning","display_name":"Dual Dependency Disentangling for Defending Model Inversion Attacks in Split Federated Learning","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415159168","doi":"https://doi.org/10.1109/tifs.2025.3621008"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3621008","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3621008","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101503805","display_name":"Tong Chen","orcid":"https://orcid.org/0009-0007-8496-1819"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tong Chen","raw_affiliation_strings":["State Key Laboratory of Complex and Critical Software Environment (CCSE), Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Complex and Critical Software Environment (CCSE), Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031116553","display_name":"Jiakai Wang","orcid":"https://orcid.org/0000-0001-5884-3412"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiakai Wang","raw_affiliation_strings":["Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078965599","display_name":"Jiejie Zhao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiejie Zhao","raw_affiliation_strings":["Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053487836","display_name":"Bowen Du","orcid":"https://orcid.org/0000-0003-0975-2367"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bowen Du","raw_affiliation_strings":["State Key Laboratory of Complex and Critical Software Environment (CCSE), Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Complex and Critical Software Environment (CCSE), Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101567973","display_name":"Haiquan Wang","orcid":"https://orcid.org/0000-0003-1745-9814"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiquan Wang","raw_affiliation_strings":["School of Software, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiaoshan Bai","orcid":"https://orcid.org/0000-0002-9754-3479"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoshan Bai","raw_affiliation_strings":["School of Software, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078642643","display_name":"Lin Zheng","orcid":"https://orcid.org/0000-0002-8057-4949"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Lin","raw_affiliation_strings":["Department of Computer Science and Technology, Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011594363","display_name":"Xianglong Liu","orcid":"https://orcid.org/0000-0001-8425-4195"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianglong Liu","raw_affiliation_strings":["State Key Laboratory of Complex and Critical Software Environment (CCSE), Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Complex and Critical Software Environment (CCSE), Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5101503805"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":2.3568,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91398604,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11609","display_name":"Geophysical Methods and Applications","score":0.9567000269889832,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.7382000088691711},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5648999810218811},{"id":"https://openalex.org/keywords/inversion","display_name":"Inversion (geology)","score":0.552299976348877},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.5073999762535095},{"id":"https://openalex.org/keywords/functional-dependency","display_name":"Functional dependency","score":0.487199991941452},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4262999892234802},{"id":"https://openalex.org/keywords/decoupling","display_name":"Decoupling (probability)","score":0.40149998664855957},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.397599995136261},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.37380000948905945}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8853999972343445},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.7382000088691711},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5648999810218811},{"id":"https://openalex.org/C1893757","wikidata":"https://www.wikidata.org/wiki/Q3653001","display_name":"Inversion (geology)","level":3,"score":0.552299976348877},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.5073999762535095},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4925999939441681},{"id":"https://openalex.org/C26320393","wikidata":"https://www.wikidata.org/wiki/Q597053","display_name":"Functional dependency","level":3,"score":0.487199991941452},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4262999892234802},{"id":"https://openalex.org/C205606062","wikidata":"https://www.wikidata.org/wiki/Q5249645","display_name":"Decoupling (probability)","level":2,"score":0.40149998664855957},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.397599995136261},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39340001344680786},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.37380000948905945},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.3732999861240387},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.359499990940094},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34200000762939453},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.326200008392334},{"id":"https://openalex.org/C2776145971","wikidata":"https://www.wikidata.org/wiki/Q30673951","display_name":"Labeled data","level":2,"score":0.3206000030040741},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.31290000677108765},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3059000074863434},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2976999878883362},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.29490000009536743},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.28029999136924744},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27129998803138733},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.2703000009059906},{"id":"https://openalex.org/C160920958","wikidata":"https://www.wikidata.org/wiki/Q7662746","display_name":"Synthetic data","level":2,"score":0.2669000029563904},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.26660001277923584},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.26420000195503235},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2621999979019165}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3621008","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3621008","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G128184983","display_name":null,"funder_award_id":"U2469205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1429908141","display_name":null,"funder_award_id":"JKF-20240769","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W2024922353","https://openalex.org/W2051267297","https://openalex.org/W2473418344","https://openalex.org/W2897830718","https://openalex.org/W2952734551","https://openalex.org/W2963209930","https://openalex.org/W2963363373","https://openalex.org/W2963989815","https://openalex.org/W2965341826","https://openalex.org/W2985580374","https://openalex.org/W2997378229","https://openalex.org/W3018102029","https://openalex.org/W3027749727","https://openalex.org/W3035616549","https://openalex.org/W3035678286","https://openalex.org/W3040384242","https://openalex.org/W3081273427","https://openalex.org/W3084432478","https://openalex.org/W3096738375","https://openalex.org/W3096831136","https://openalex.org/W3115214388","https://openalex.org/W3126765304","https://openalex.org/W3132522414","https://openalex.org/W3167424384","https://openalex.org/W3173069197","https://openalex.org/W3176547129","https://openalex.org/W3178746453","https://openalex.org/W3213008925","https://openalex.org/W4221146015","https://openalex.org/W4229820657","https://openalex.org/W4292828967","https://openalex.org/W4308642595","https://openalex.org/W4312815981","https://openalex.org/W4317553700","https://openalex.org/W4321353638","https://openalex.org/W4366957333","https://openalex.org/W4385815544","https://openalex.org/W4386275757","https://openalex.org/W4387665621","https://openalex.org/W4389370843","https://openalex.org/W4389428766","https://openalex.org/W4392397456","https://openalex.org/W4392450548","https://openalex.org/W4400648127","https://openalex.org/W4401023877","https://openalex.org/W4408164332","https://openalex.org/W4409427637"],"related_works":[],"abstract_inverted_index":{"Recent":[0],"studies":[1],"have":[2],"revealed":[3],"that":[4,125,168],"Split":[5],"Federated":[6],"Learning":[7],"(SFL)":[8],"is":[9,224],"vulnerable":[10],"to":[11,36,40,58,76,112,130,182],"Model":[12],"Inversion":[13],"(MI)":[14],"attacks,":[15],"where":[16],"the":[17,37,42,85,107,132,163,171,204],"attacker":[18],"can":[19,55],"reconstruct":[20],"clients\u2019":[21],"raw":[22],"data":[23],"by":[24,101],"exploiting":[25],"collected":[26],"features.":[27,50],"Though":[28],"achieving":[29,173],"results,":[30],"current":[31],"defenses":[32],"are":[33],"unsatisfactory":[34],"due":[35],"limited":[38,53],"ability":[39,54,79,176],"suppress":[41],"sensitive":[43,114,137],"information":[44,48],"while":[45,83,192],"preserving":[46],"task-conducive":[47],"within":[49],"Since":[51],"such":[52],"be":[56],"attributed":[57],"insufficient":[59],"disentanglement":[60,108,142],"of":[61,109,143],"data-feature":[62,93,110],"and":[63,135,150,160,162,185,199,209,212],"feature-task":[64,121,144],"dependencies,":[65],"we":[66,88,117],"propose":[67,90,118],"a":[68,91,119,214],"Dual":[69],"Dependency":[70],"Disentangling":[71],"framework":[72],"for":[73,146],"SFL":[74,206],"(D3SFL)":[75],"strengthen":[77],"defense":[78,175],"against":[80,177],"MI":[81,178],"attacks":[82,179],"maintaining":[84,193],"utility.":[86],"Specifically,":[87],"first":[89],"variable-structure":[92],"dependency":[94,122],"decoupling":[95],"module,":[96],"which":[97],"produces":[98],"privacy-preserving":[99],"features":[100,134],"learning":[102],"input-specific":[103],"sub-networks,":[104],"therefore":[105],"enhancing":[106],"dependencies":[111,145],"hide":[113],"information.":[115],"Then,":[116],"stochastic":[120],"separating":[123],"module":[124],"adopts":[126],"sparse":[127],"binary":[128],"masks":[129],"preserve":[131],"target-task-critical":[133],"reduce":[136],"information,":[138],"resulting":[139],"in":[140],"effective":[141],"lower":[147],"privacy":[148],"leakage":[149],"better":[151,194],"utility":[152,195],"maintenance.":[153],"Extensive":[154],"experiments":[155],"on":[156,189,207,218],"image-classification":[157],"datasets":[158],"(CIFAR-100":[159],"FaceScrub)":[161],"time-series":[164],"dataset":[165],"(METR-LA)":[166],"show":[167],"D3SFL":[169],"outperforms":[170],"comparisons,":[172],"remarkable":[174],"(with":[180,196],"up":[181],"54\u00d7,":[183],"17\u00d7,":[184],"18\u00d7":[186],"reconstruction":[187],"MSE":[188],"average,":[190],"respectively)":[191],"only":[197,213],"0.13%":[198],"0.06%":[200],"Accuracy":[201],"drops":[202],"over":[203,220],"standard":[205],"CIFAR-100":[208],"FaceScrub,":[210],"respectively,":[211],"0.03":[215],"MAE":[216],"increase":[217],"METR-LA":[219],"CNFGNN).":[221],"Our":[222],"code":[223],"available":[225],"at":[226],"https://github.com/Shawn-CT/D3SFL.":[227]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-14T00:00:00"}
