{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:40:14Z","timestamp":1725788414840},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3591197.3593638","type":"proceedings-article","created":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T14:58:49Z","timestamp":1686322729000},"page":"1-5","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Membership Inference Vulnerabilities in Peer-to-Peer Federated Learning"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8291-4855","authenticated-orcid":false,"given":"Alka","family":"Luqman","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8818-6983","authenticated-orcid":false,"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7479-7970","authenticated-orcid":false,"given":"Kwok-Yan","family":"Lam","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sanjiv Kumar, and Brendan McMahan.","author":"Agarwal Naman","year":"2018","unstructured":"Naman Agarwal, Ananda\u00a0Theertha Suresh, Felix Xinnan\u00a0X Yu, Sanjiv Kumar, and Brendan McMahan. 2018. cpSGD: Communication-efficient and differentially-private distributed SGD. Advances in Neural Information Processing Systems 31 (2018)."},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on Artificial Intelligence and Statistics. PMLR, 2938\u20132948","author":"Bagdasaryan Eugene","year":"2020","unstructured":"Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2020. How to backdoor federated learning. In International Conference on Artificial Intelligence and Statistics. PMLR, 2938\u20132948."},{"key":"e_1_3_2_1_3_1","volume-title":"A little is enough: Circumventing defenses for distributed learning. Advances in Neural Information Processing Systems 32","author":"Baruch Gilad","year":"2019","unstructured":"Gilad Baruch, Moran Baruch, and Yoav Goldberg. 2019. A little is enough: Circumventing defenses for distributed learning. Advances in Neural Information Processing Systems 32 (2019)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_5_1","volume-title":"International conference on machine learning. PMLR","author":"Choquette-Choo A","year":"2021","unstructured":"Christopher\u00a0A Choquette-Choo, Florian Tramer, Nicholas Carlini, and Nicolas Papernot. 2021. Label-only membership inference attacks. In International conference on machine learning. PMLR, 1964\u20131974."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS58070.2022.10062088"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium. 1623\u20131640","author":"Fang Minghong","year":"2020","unstructured":"Minghong Fang, Xiaoyu Cao, Jinyuan Jia, and Neil\u00a0Zhenqiang Gong. 2020. Local model poisoning attacks to byzantine-robust federated learning. In Proceedings of the 29th USENIX Conference on Security Symposium. 1623\u20131640."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_9_1","volume-title":"Inverting gradients-how easy is it to break privacy in federated learning?Advances in Neural Information Processing Systems 33","author":"Geiping Jonas","year":"2020","unstructured":"Jonas Geiping, Hartmut Bauermeister, Hannah Dr\u00f6ge, and Michael Moeller. 2020. Inverting gradients-how easy is it to break privacy in federated learning?Advances in Neural Information Processing Systems 33 (2020), 16937\u201316947."},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Security Symposium. 979\u2013995","author":"Gong Neil\u00a0Zhenqiang","year":"2016","unstructured":"Neil\u00a0Zhenqiang Gong and Bin Liu. 2016. You Are Who You Know and How You Behave: Attribute Inference Attacks via Users\u2019 Social Friends and Behaviors.. In USENIX Security Symposium. 979\u2013995."},{"key":"e_1_3_2_1_11_1","volume-title":"Byzantine fault-tolerance in peer-to-peer distributed gradient-descent. arXiv preprint arXiv:2101.12316","author":"Gupta Nirupam","year":"2021","unstructured":"Nirupam Gupta and Nitin\u00a0H Vaidya. 2021. Byzantine fault-tolerance in peer-to-peer distributed gradient-descent. arXiv preprint arXiv:2101.12316 (2021)."},{"key":"e_1_3_2_1_12_1","volume-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677","author":"Hardy Stephen","year":"2017","unstructured":"Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Richard Nock, Giorgio Patrini, Guillaume Smith, and Brian Thorne. 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677 (2017)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2015. Deep Residual Learning for Image Recognition. https:\/\/doi.org\/10.48550\/ARXIV.1512.03385","DOI":"10.48550\/ARXIV.1512.03385"},{"key":"e_1_3_2_1_14_1","volume-title":"Model extraction and adversarial transferability, your BERT is vulnerable!arXiv preprint arXiv:2103.10013","author":"He Xuanli","year":"2021","unstructured":"Xuanli He, Lingjuan Lyu, Qiongkai Xu, and Lichao Sun. 2021. Model extraction and adversarial transferability, your BERT is vulnerable!arXiv preprint arXiv:2103.10013 (2021)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"e_1_3_2_1_16_1","volume-title":"Dynamic adversarial patch for evading object detection models. arXiv preprint arXiv:2010.13070","author":"Hoory Shahar","year":"2020","unstructured":"Shahar Hoory, Tzvika Shapira, Asaf Shabtai, and Yuval Elovici. 2020. Dynamic adversarial patch for evading object detection models. arXiv preprint arXiv:2010.13070 (2020)."},{"key":"e_1_3_2_1_17_1","volume-title":"High Accuracy and High Fidelity Extraction of Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Jagielski Matthew","year":"2020","unstructured":"Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, and Nicolas Papernot. 2020. High Accuracy and High Fidelity Extraction of Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1345\u20131362. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/jagielski"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3085960"},{"key":"e_1_3_2_1_19_1","volume-title":"Advances and open problems in federated learning. Foundations and Trends\u00ae in Machine Learning 14, 1\u20132","author":"Kairouz Peter","year":"2021","unstructured":"Peter Kairouz, H\u00a0Brendan McMahan, Brendan Avent, Aur\u00e9lien Bellet, Mehdi Bennis, Arjun\u00a0Nitin Bhagoji, Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, 2021. Advances and open problems in federated learning. Foundations and Trends\u00ae in Machine Learning 14, 1\u20132 (2021), 1\u2013210."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid49817.2020.00-52"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpa.2023.100469"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00995"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of Machine learning and systems 2","author":"Li Tian","year":"2020","unstructured":"Tian Li, Anit\u00a0Kumar Sahu, Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, and Virginia Smith. 2020. Federated optimization in heterogeneous networks. Proceedings of Machine learning and systems 2 (2020), 429\u2013450."},{"key":"e_1_3_2_1_24_1","volume-title":"Free-riders in federated learning: Attacks and defenses. arXiv preprint arXiv:1911.12560","author":"Lin Jierui","year":"2019","unstructured":"Jierui Lin, Min Du, and Jian Liu. 2019. Free-riders in federated learning: Attacks and defenses. arXiv preprint arXiv:1911.12560 (2019)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00105-6"},{"key":"e_1_3_2_1_26_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise\u00a0Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR 1273\u20131282."},{"key":"e_1_3_2_1_27_1","volume-title":"Learning differentially private recurrent language models. arXiv preprint arXiv:1710.06963","author":"McMahan H\u00a0Brendan","year":"2017","unstructured":"H\u00a0Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. 2017. Learning differentially private recurrent language models. arXiv preprint arXiv:1710.06963 (2017)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Luca Melis Congzheng Song Emiliano\u00a0De Cristofaro and Vitaly Shmatikov. 2018. Exploiting Unintended Feature Leakage in Collaborative Learning. arxiv:1805.04049\u00a0[cs.CR]","DOI":"10.1109\/SP.2019.00029"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706947"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140451"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.48"},{"key":"e_1_3_2_1_34_1","volume-title":"Braintorrent: A peer-to-peer environment for decentralized federated learning. arXiv preprint arXiv:1905.06731","author":"Roy Abhijit\u00a0Guha","year":"2019","unstructured":"Abhijit\u00a0Guha Roy, Shayan Siddiqui, Sebastian P\u00f6lsterl, Nassir Navab, and Christian Wachinger. 2019. Braintorrent: A peer-to-peer environment for decentralized federated learning. arXiv preprint arXiv:1905.06731 (2019)."},{"volume-title":"Vol.\u00a01","author":"Sabt Mohamed","key":"e_1_3_2_1_35_1","unstructured":"Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah. 2015. Trusted execution environment: what it is, and what it is not. In 2015 IEEE Trustcom\/BigDataSE\/Ispa, Vol.\u00a01. IEEE, 57\u201364."},{"key":"e_1_3_2_1_36_1","volume-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246","author":"Salem Ahmed","year":"2018","unstructured":"Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2018. Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246 (2018)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/882470.883282"},{"key":"e_1_3_2_1_39_1","volume-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks. Advances in neural information processing systems 31","author":"Shafahi Ali","year":"2018","unstructured":"Ali Shafahi, W\u00a0Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_2_1_40_1","volume-title":"2020 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 175\u2013183","author":"Shokri Reza","year":"2020","unstructured":"Reza Shokri 2020. Bypassing backdoor detection algorithms in deep learning. In 2020 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 175\u2013183."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. https:\/\/doi.org\/10.48550\/ARXIV.1409.1556","DOI":"10.48550\/ARXIV.1409.1556"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000372"},{"key":"e_1_3_2_1_44_1","volume-title":"Can you really backdoor federated learning?arXiv preprint arXiv:1911.07963","author":"Sun Ziteng","year":"2019","unstructured":"Ziteng Sun, Peter Kairouz, Ananda\u00a0Theertha Suresh, and H\u00a0Brendan McMahan. 2019. Can you really backdoor federated learning?arXiv preprint arXiv:1911.07963 (2019)."},{"key":"e_1_3_2_1_45_1","unstructured":"Florian Tram\u00e8r Fan Zhang Ari Juels Michael\u00a0K Reiter and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs.. In USENIX security symposium Vol.\u00a016. 601\u2013618."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00038"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W52860.2021.00034"},{"key":"e_1_3_2_1_51_1","volume-title":"Beyond model extraction: Imitation attack for black-box nlp apis. arXiv e-prints","author":"Xu Qiongkai","year":"2021","unstructured":"Qiongkai Xu, Xuanli He, Lingjuan Lyu, Lizhen Qu, and Gholamreza Haffari. 2021. Beyond model extraction: Imitation attack for black-box nlp apis. arXiv e-prints (2021), arXiv\u20132108."},{"key":"e_1_3_2_1_52_1","volume-title":"Backdoor Attacks in Peer-to-Peer Federated Learning. arXiv preprint arXiv:2301.09732","author":"Yar Gokberk","year":"2023","unstructured":"Gokberk Yar, Cristina Nita-Rotaru, and Alina Oprea. 2023. Backdoor Attacks in Peer-to-Peer Federated Learning. arXiv preprint arXiv:2301.09732 (2023)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01607"},{"key":"e_1_3_2_1_54_1","volume-title":"USENIX Security Symposium. 2687\u20132704","author":"Zhang Wanrong","year":"2021","unstructured":"Wanrong Zhang, Shruti Tople, and Olga Ohrimenko. 2021. Leakage of Dataset Properties in Multi-Party Machine Learning.. In USENIX Security Symposium. 2687\u20132704."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"e_1_3_2_1_56_1","volume-title":"Deep leakage from gradients. Advances in neural information processing systems 32","author":"Zhu Ligeng","year":"2019","unstructured":"Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep leakage from gradients. Advances in neural information processing systems 32 (2019)."}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3591197.3593638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T10:34:28Z","timestamp":1720607668000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3591197.3593638"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":56,"alternative-id":["10.1145\/3591197.3593638","10.1145\/3591197"],"URL":"https:\/\/doi.org\/10.1145\/3591197.3593638","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}