{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:22:25Z","timestamp":1730326945520,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607218","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"236-249","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Clustered Federated Learning\u2019s Vulnerability against Property Inference Attack"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3886-0586","authenticated-orcid":false,"given":"Hyunjun","family":"Kim","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1297-8586","authenticated-orcid":false,"given":"Yungi","family":"Cho","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8414-966X","authenticated-orcid":false,"given":"Younghan","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5238-3547","authenticated-orcid":false,"given":"Ho","family":"Bae","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, Ewha Womans University, Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6412-2926","authenticated-orcid":false,"given":"Yunheung","family":"Paek","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"volume-title":"International Conference on Artificial Intelligence and Statistics. PMLR, 2938\u20132948","year":"2020","author":"Bagdasaryan Eugene","key":"e_1_3_2_1_2_1","unstructured":"Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2020. How to backdoor federated learning. In International Conference on Artificial Intelligence and Statistics. PMLR, 2938\u20132948."},{"volume-title":"Local privacy, data processing inequalities, and statistical minimax rates. arXiv preprint arXiv:1302.3203","year":"2013","author":"Duchi C","key":"e_1_3_2_1_3_1","unstructured":"John\u00a0C Duchi, Michael\u00a0I Jordan, and Martin\u00a0J Wainwright. 2013. Local privacy, data processing inequalities, and statistical minimax rates. arXiv preprint arXiv:1302.3203 (2013)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243834"},{"volume-title":"Inverting gradients-how easy is it to break privacy in federated learning?Advances in Neural Information Processing Systems 33","year":"2020","author":"Geiping Jonas","key":"e_1_3_2_1_6_1","unstructured":"Jonas Geiping, Hartmut Bauermeister, Hannah Dr\u00f6ge, and Michael Moeller. 2020. Inverting gradients-how easy is it to break privacy in federated learning?Advances in Neural Information Processing Systems 33 (2020), 16937\u201316947."},{"volume-title":"Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557","year":"2017","author":"Geyer C","key":"e_1_3_2_1_7_1","unstructured":"Robin\u00a0C Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 (2017)."},{"key":"e_1_3_2_1_8_1","first-page":"19586","article-title":"An efficient framework for clustered federated learning","volume":"33","author":"Ghosh Avishek","year":"2020","unstructured":"Avishek Ghosh, Jichan Chung, Dong Yin, and Kannan Ramchandran. 2020. An efficient framework for clustered federated learning. Advances in Neural Information Processing Systems 33 (2020), 19586\u201319597.","journal-title":"Advances in Neural Information Processing Systems"},{"volume-title":"Workshop on faces in\u2019Real-Life\u2019Images: detection, alignment, and recognition.","year":"2008","author":"Huang B","key":"e_1_3_2_1_9_1","unstructured":"Gary\u00a0B Huang, Marwan Mattar, Tamara Berg, and Eric Learned-Miller. 2008. Labeled faces in the wild: A database forstudying face recognition in unconstrained environments. In Workshop on faces in\u2019Real-Life\u2019Images: detection, alignment, and recognition."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00990"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363201"},{"volume-title":"Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492","year":"2016","author":"Kone\u010dn\u1ef3 Jakub","key":"e_1_3_2_1_12_1","unstructured":"Jakub Kone\u010dn\u1ef3, H\u00a0Brendan McMahan, Felix\u00a0X Yu, Peter Richt\u00e1rik, Ananda\u00a0Theertha Suresh, and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3113927"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3240767"},{"volume-title":"Three approaches for personalization with applications to federated learning. arXiv preprint arXiv:2002.10619","year":"2020","author":"Mansour Yishay","key":"e_1_3_2_1_15_1","unstructured":"Yishay Mansour, Mehryar Mohri, Jae Ro, and Ananda\u00a0Theertha Suresh. 2020. Three approaches for personalization with applications to federated learning. arXiv preprint arXiv:2002.10619 (2020)."},{"key":"e_1_3_2_1_16_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise\u00a0Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR 1273\u20131282."},{"volume-title":"Learning Differentially Private Recurrent Language Models. In International Conference on Learning Representations.","year":"2018","author":"McMahan H\u00a0Brendan","key":"e_1_3_2_1_17_1","unstructured":"H\u00a0Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. 2018. Learning Differentially Private Recurrent Language Models. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"volume-title":"Local and Central Differential Privacy for Robustness and Privacy in Federated Learning. In Network and Distributed Systems Security (NDSS) Symposium","year":"2022","author":"Naseri Mohammad","key":"e_1_3_2_1_19_1","unstructured":"Mohammad Naseri, Jamie Hayes, and Emiliano De\u00a0Cristofaro. 2022. Local and Central Differential Privacy for Robustness and Privacy in Federated Learning. In Network and Distributed Systems Security (NDSS) Symposium 2022."},{"volume-title":"arXiv preprint arXiv:1807.04369","year":"2018","author":"Pihur Vasyl","key":"e_1_3_2_1_20_1","unstructured":"Vasyl Pihur, Aleksandra Korolova, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, and Ruogu Zeng. 2018. Differentially-private\" draw and discard\" machine learning. arXiv preprint arXiv:1807.04369 (2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i7.20785"},{"volume-title":"Clustered federated learning: Model-agnostic distributed multitask optimization under privacy constraints","year":"2020","author":"Sattler Felix","key":"e_1_3_2_1_22_1","unstructured":"Felix Sattler, Klaus-Robert M\u00fcller, and Wojciech Samek. 2020. Clustered federated learning: Model-agnostic distributed multitask optimization under privacy constraints. IEEE transactions on neural networks and learning systems 32, 8 (2020), 3710\u20133722."},{"key":"e_1_3_2_1_23_1","unstructured":"Neta Shoham Tomer Avidor Aviv Keren Nadav Israel Daniel Benditkis Liron Mor-Yosef and Itai Zeitak. 2019. Overcoming forgetting in federated learning on non-iid data. (2019)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00919"},{"volume-title":"Can you really backdoor federated learning?arXiv preprint arXiv:1911.07963","year":"2019","author":"Sun Ziteng","key":"e_1_3_2_1_26_1","unstructured":"Ziteng Sun, Peter Kairouz, Ananda\u00a0Theertha Suresh, and H\u00a0Brendan McMahan. 2019. Can you really backdoor federated learning?arXiv preprint arXiv:1911.07963 (2019)."},{"volume-title":"Visualizing data using t-SNE.Journal of machine learning research 9, 11","year":"2008","author":"Maaten Laurens Van\u00a0der","key":"e_1_3_2_1_27_1","unstructured":"Laurens Van\u00a0der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE.Journal of machine learning research 9, 11 (2008)."},{"volume-title":"ICLR 2020","year":"2020","author":"Wang Hongyi","key":"e_1_3_2_1_28_1","unstructured":"Hongyi Wang, Mikhail Yurochkin, Yuekai Sun, Dimitris Papailiopoulos, and Yasaman Khazaeni. 2020. Federated learning with matched averaging. ICLR 2020 (2020)."},{"volume-title":"ESORICS 2020, Guildford, UK, September 14\u201318, 2020, Proceedings, Part I 25","year":"2020","author":"Wei Wenqi","key":"e_1_3_2_1_29_1","unstructured":"Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Mehmet\u00a0Emre Gursoy, Stacey Truex, and Yanzhao Wu. 2020. A framework for evaluating client privacy leakages in federated learning. In Computer Security\u2013ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14\u201318, 2020, Proceedings, Part I 25. Springer, 545\u2013566."}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:32:01Z","timestamp":1729074721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607218"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":29,"alternative-id":["10.1145\/3607199.3607218","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607218","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}