{"id":"https://openalex.org/W4311165847","doi":"https://doi.org/10.1145/3564625.3564657","title":"Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint","display_name":"Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint","publication_year":2022,"publication_date":"2022-12-03","ids":{"openalex":"https://openalex.org/W4311165847","doi":"https://doi.org/10.1145/3564625.3564657"},"language":"en","primary_location":{"id":"doi:10.1145/3564625.3564657","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3564625.3564657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020454074","display_name":"Seung Ho Na","orcid":"https://orcid.org/0000-0003-0908-1233"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Seung Ho Na","raw_affiliation_strings":["KAIST, Korea, South \u2013 Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0003-0908-1233","affiliations":[{"raw_affiliation_string":"KAIST, Korea, South \u2013 Republic of Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011187138","display_name":"Hyeong Gwon Hong","orcid":"https://orcid.org/0000-0003-2410-2717"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyeong Gwon Hong","raw_affiliation_strings":["KAIST, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0003-2410-2717","affiliations":[{"raw_affiliation_string":"KAIST, Republic of Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100606266","display_name":"Junmo Kim","orcid":"https://orcid.org/0000-0002-7174-7932"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Junmo Kim","raw_affiliation_strings":["KAIST, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-7174-7932","affiliations":[{"raw_affiliation_string":"KAIST, Republic of Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078170052","display_name":"Seungwon Shin","orcid":"https://orcid.org/0000-0002-7627-5815"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seungwon Shin","raw_affiliation_strings":["KAIST, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-7627-5815","affiliations":[{"raw_affiliation_string":"KAIST, Republic of Korea","institution_ids":["https://openalex.org/I157485424"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5020454074"],"corresponding_institution_ids":["https://openalex.org/I157485424"],"apc_list":null,"apc_paid":null,"fwci":0.8324,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.7821814,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"332","last_page":"345"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9684000015258789,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13048","display_name":"Patient Dignity and Privacy","score":0.9175000190734863,"subfield":{"id":"https://openalex.org/subfields/2739","display_name":"Public Health, Environmental and Occupational Health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.835228681564331},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7952286005020142},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.6289243698120117},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6132109761238098},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5913340449333191},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5582301020622253},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.5146887898445129},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.48366817831993103},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39539796113967896},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3120882213115692},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.19052991271018982}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.835228681564331},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7952286005020142},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.6289243698120117},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6132109761238098},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5913340449333191},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5582301020622253},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.5146887898445129},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.48366817831993103},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39539796113967896},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3120882213115692},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.19052991271018982}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3564625.3564657","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3564625.3564657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1495868994","https://openalex.org/W1915485278","https://openalex.org/W1981029888","https://openalex.org/W2017126829","https://openalex.org/W2053801139","https://openalex.org/W2145096794","https://openalex.org/W2194775991","https://openalex.org/W2473418344","https://openalex.org/W2535690855","https://openalex.org/W2591882872","https://openalex.org/W2734358244","https://openalex.org/W2767079719","https://openalex.org/W2775776326","https://openalex.org/W2888161220","https://openalex.org/W2889507104","https://openalex.org/W2897830718","https://openalex.org/W2930926105","https://openalex.org/W2963456518","https://openalex.org/W2964162474","https://openalex.org/W2964881778","https://openalex.org/W2970606380","https://openalex.org/W2984242138","https://openalex.org/W2990239018","https://openalex.org/W2995191368","https://openalex.org/W3016632787","https://openalex.org/W3027749727","https://openalex.org/W3081130510","https://openalex.org/W3102834148","https://openalex.org/W3103245149","https://openalex.org/W3106378891","https://openalex.org/W3135434750","https://openalex.org/W3176786489","https://openalex.org/W3178386862","https://openalex.org/W4205228770","https://openalex.org/W4250955649","https://openalex.org/W4286825659"],"related_works":["https://openalex.org/W4286971788","https://openalex.org/W3199340467","https://openalex.org/W3157608626","https://openalex.org/W3132132958","https://openalex.org/W4321612632","https://openalex.org/W4322580403","https://openalex.org/W3193217249","https://openalex.org/W4280591108","https://openalex.org/W3021849752","https://openalex.org/W2596305496"],"abstract_inverted_index":{"Federated":[0,125],"Learning":[1,126],"was":[2],"deemed":[3],"as":[4],"a":[5,72,128,137,146,196],"private":[6,33],"distributed":[7],"learning":[8,182,203],"framework":[9,135,173],"due":[10],"to":[11,44,60,162,194,199],"the":[12,17,79,151,163],"separation":[13],"of":[14,32,75,81,178],"data":[15,176],"from":[16,35,78,92],"central":[18],"server.":[19,164],"However,":[20],"recent":[21],"works":[22],"have":[23],"shown":[24],"that":[25,86,99,171],"privacy":[26,43,76,84,94,100,177,200,207],"attacks":[27,50,77,88],"can":[28,209],"extract":[29],"various":[30],"forms":[31],"information":[34],"legacy":[36],"federated":[37,181,202],"learning.":[38],"Previous":[39],"literature":[40],"describe":[41],"differential":[42],"be":[45,61],"effective":[46],"against":[47,63,131],"membership":[48],"inference":[49,53],"and":[51,96,154,204],"attribute":[52],"attacks,":[54,95],"but":[55],"our":[56,107,172],"experiments":[57],"show":[58,166],"them":[59],"vulnerable":[62],"reconstruction":[64,87,109,132],"attacks.":[65,133],"To":[66,119],"understand":[67],"this":[68,120,206],"outcome,":[69],"we":[70,97,122],"execute":[71],"systematic":[73],"study":[74],"standpoint":[80],"privacy.":[82],"The":[83],"characteristics":[85],"infringe":[89],"are":[90,158],"different":[91,104],"other":[93],"suggest":[98],"breach":[101],"occurred":[102],"at":[103],"levels.":[105],"From":[106],"study,":[108],"attack":[110],"defense":[111],"methods":[112],"entail":[113],"heavy":[114],"computation":[115],"or":[116],"communication":[117,190],"costs.":[118],"end,":[121],"propose":[123],"Fragmented":[124],"(FFL),":[127],"lightweight":[129],"solution":[130],"This":[134],"utilizes":[136],"simple":[138],"yet":[139],"novel":[140],"gradient":[141,153],"obscuring":[142],"algorithm":[143],"based":[144],"on":[145],"newly":[147],"proposed":[148],"concept":[149],"called":[150],"global":[152],"determines":[155],"which":[156],"layers":[157],"safe":[159],"for":[160],"submission":[161],"We":[165,192],"empirically":[167],"in":[168,180,201],"diverse":[169],"settings":[170],"improves":[174],"practical":[175],"clients":[179],"with":[183],"an":[184],"acceptable":[185],"performance":[186],"trade-off":[187],"without":[188],"increasing":[189],"cost.":[191],"aim":[193],"provide":[195],"new":[197],"perspective":[198],"hope":[205],"differentiation":[208],"improve":[210],"future":[211],"privacy-preserving":[212],"methods.":[213]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
