{"id":"https://openalex.org/W4380033533","doi":"https://doi.org/10.1145/3591197.3593638","title":"Membership Inference Vulnerabilities in Peer-to-Peer Federated Learning","display_name":"Membership Inference Vulnerabilities in Peer-to-Peer Federated Learning","publication_year":2023,"publication_date":"2023-06-09","ids":{"openalex":"https://openalex.org/W4380033533","doi":"https://doi.org/10.1145/3591197.3593638"},"language":"en","primary_location":{"id":"doi:10.1145/3591197.3593638","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3591197.3593638","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hdl.handle.net/10356/173390","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069410461","display_name":"Alka Luqman","orcid":"https://orcid.org/0000-0002-8291-4855"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Alka Luqman","raw_affiliation_strings":["Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089860351","display_name":"Anupam Chattopadhyay","orcid":"https://orcid.org/0000-0002-8818-6983"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Anupam Chattopadhyay","raw_affiliation_strings":["Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101720092","display_name":"Kwok\u2010Yan Lam","orcid":"https://orcid.org/0000-0001-7479-7970"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Kwok-Yan Lam","raw_affiliation_strings":["Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069410461"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":1.0474,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.80712159,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8294651508331299},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8129015564918518},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.7809094786643982},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6423406600952148},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48276486992836},{"id":"https://openalex.org/keywords/distributed-learning","display_name":"Distributed learning","score":0.4802008867263794},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.4717223048210144},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.44478875398635864},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.425933301448822},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4220530390739441},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40298280119895935},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3582037687301636},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26205360889434814},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.14282476902008057}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8294651508331299},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8129015564918518},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.7809094786643982},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6423406600952148},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48276486992836},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.4802008867263794},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.4717223048210144},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.44478875398635864},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.425933301448822},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4220530390739441},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40298280119895935},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3582037687301636},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26205360889434814},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.14282476902008057},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3591197.3593638","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3591197.3593638","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop","raw_type":"proceedings-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/173390","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/173390","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Paper"}],"best_oa_location":{"id":"pmh:oai:dr.ntu.edu.sg:10356/173390","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/173390","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Paper"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4300000071525574,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2051267297","https://openalex.org/W2087970742","https://openalex.org/W2535690855","https://openalex.org/W2591882872","https://openalex.org/W2626533970","https://openalex.org/W2767079719","https://openalex.org/W2804268522","https://openalex.org/W2914630606","https://openalex.org/W2930926105","https://openalex.org/W2949650786","https://openalex.org/W2962835968","https://openalex.org/W2963163009","https://openalex.org/W2963313259","https://openalex.org/W2963456518","https://openalex.org/W2963844355","https://openalex.org/W2964043980","https://openalex.org/W2970606380","https://openalex.org/W3016632787","https://openalex.org/W3033686777","https://openalex.org/W3035616549","https://openalex.org/W3042336089","https://openalex.org/W3103245149","https://openalex.org/W3118635493","https://openalex.org/W3172555720","https://openalex.org/W3175192640","https://openalex.org/W3193135755","https://openalex.org/W4210630464","https://openalex.org/W4299301436","https://openalex.org/W4312815981","https://openalex.org/W4317626601","https://openalex.org/W6771536673"],"related_works":["https://openalex.org/W4317941881","https://openalex.org/W2998530156","https://openalex.org/W3035996294","https://openalex.org/W4323521275","https://openalex.org/W2954034773","https://openalex.org/W3013510494","https://openalex.org/W4229067761","https://openalex.org/W3091296419","https://openalex.org/W3145562225","https://openalex.org/W3210293592"],"abstract_inverted_index":{"Federated":[0],"learning":[1,29,59,113,125],"is":[2,34],"emerging":[3],"as":[4],"an":[5],"efficient":[6],"approach":[7],"to":[8,15,26,62,77,83,102,130],"exploit":[9],"data":[10,18,87,146],"silos":[11],"that":[12,106],"form":[13],"due":[14],"regulations":[16],"about":[17],"sharing":[19],"and":[20,82,88],"usage,":[21],"thereby":[22],"leveraging":[23],"distributed":[24],"resources":[25],"improve":[27],"the":[28,63,74,79,85,97,104,132,143],"of":[30,99,145],"ML":[31,65,100],"models.":[32],"It":[33],"a":[35,69,109,122,137],"fitting":[36],"technology":[37],"for":[38],"cyber":[39],"physical":[40],"systems":[41],"in":[42,57,108,121,136],"applications":[43],"like":[44],"connected":[45],"autonomous":[46],"vehicles,":[47],"smart":[48],"farming,":[49],"IoT":[50],"surveillance":[51],"etc.":[52],"By":[53],"design,":[54],"every":[55],"participant":[56],"federated":[58,112,124],"has":[60],"access":[61],"latest":[64],"model.":[66],"In":[67,92],"such":[68],"scenario,":[70],"it":[71],"becomes":[72],"all":[73],"more":[75],"important":[76],"protect":[78],"model\u2019s":[80],"knowledge,":[81],"keep":[84],"training":[86],"its":[89],"properties":[90],"private.":[91],"this":[93],"paper,":[94],"we":[95],"survey":[96],"literature":[98],"attacks":[101,119],"assess":[103],"risks":[105],"apply":[107],"peer-to-peer":[110],"(P2P)":[111],"setup.":[114],"We":[115],"perform":[116],"membership":[117],"inference":[118],"specifically":[120],"P2P":[123],"setting":[126],"with":[127],"colluding":[128],"adversaries":[129],"evaluate":[131],"privacy-accuracy":[133],"trade":[134],"offs":[135],"deep":[138],"neural":[139],"network":[140],"thus":[141],"demonstrating":[142],"extent":[144],"leakage":[147],"possible.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
