• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Liang, H. (Liang, H..) [1] | Li, Y. (Li, Y..) [2] | Zhang, C. (Zhang, C..) [3] | Liu, X. (Liu, X..) [4] | Zhu, L. (Zhu, L..) [5]

Indexed by:

Scopus

Abstract:

Federated learning (FL) has achieved state-of-the-art performance in distributed learning tasks with privacy requirements. However, it has been discovered that FL is vulnerable to adversarial attacks. The typical gradient inversion attacks primarily focus on attempting to obtain the client’s private input in a white-box manner, where the adversary is assumed to be either the client or the server. However, if both the clients and the server are honest and fully trusted, is the FL secure? In this paper, we propose a novel method called External Gradient Inversion Attack (EGIA) in the grey-box settings. Specifically, we concentrate on the point that public-shared gradients in FL are always transmitted through the intermediary nodes, which has been widely ignored. On this basis, we demonstrate that an external adversary can reconstruct the private input using gradients even if both the clients and the server are honest and fully trusted. We also provide a comprehensive theoretical analysis of the black-box attack scenario in which the adversary has only the gradients. We perform extensive experiments on multiple real-world datasets to test the effectiveness of EGIA. The outcomes of our experiments validate that the EGIA method is highly effective. IEEE

Keyword:

black-box attack Data privacy Euclidean distance external adversary federated learning Generative adversarial networks Glass box gradient inversion grey-box attack Security Servers Training

Community:

  • [ 1 ] [Liang H.]School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China
  • [ 2 ] [Li Y.]School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China
  • [ 3 ] [Zhang C.]School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China
  • [ 4 ] [Liu X.]College of Computer and Data Science, Fuzhou University, Fuzhou, China
  • [ 5 ] [Zhu L.]School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Information Forensics and Security

ISSN: 1556-6013

Year: 2023

Volume: 18

Page: 1-1

6 . 3

JCR@2023

6 . 3 0 0

JCR@2023

ESI HC Threshold:32

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 9

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:148/10036718
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1