• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

You, Zhichao (You, Zhichao.) [1] | Dong, Xuewen (Dong, Xuewen.) [2] | Li, Shujun (Li, Shujun.) [3] | Liu, Ximeng (Liu, Ximeng.) [4] | Ma, Siqi (Ma, Siqi.) [5] | Shen, Yulong (Shen, Yulong.) [6]

Indexed by:

EI

Abstract:

Reconstruction attacks against federated learning (FL) aim to reconstruct users’ samples through users’ uploaded gradients. Local differential privacy (LDP) is regarded as an effective defense against various attacks, including sample reconstruction in FL, where gradients are clipped and perturbed. Existing attacks are ineffective in FL with LDP since clipped and perturbed gradients obliterate most sample information for reconstruction. Besides, existing attacks embed additional sample information into gradients to improve the attack effect and cause gradient expansion, leading to a more severe gradient clipping in FL with LDP. In this paper, we propose a sample reconstruction attack against LDP-based FL with any target models to reconstruct victims’ sensitive samples to illustrate that FL with LDP is not flawless. Considering gradient expansion in reconstruction attacks and noise in LDP, the core of the proposed attack is gradient compression and reconstructed sample denoising. For gradient compression, an inference structure based on sample characteristics is presented to reduce redundant gradients against LDP. For reconstructed sample denoising, we artificially introduce zero gradients to observe noise distribution and scale confidence interval to filter the noise. Theoretical proof guarantees the effectiveness of the proposed attack. Evaluations show that the proposed attack is the only attack that reconstructs victims’ training samples in LDP-based FL and has little impact on the target model’s accuracy. We conclude that LDP-based FL needs further improvements to defend against sample reconstruction attacks effectively. © 2025 IEEE. All rights reserved.

Keyword:

Differential privacy Federated learning

Community:

  • [ 1 ] [You, Zhichao]The School of Computer Science and Technology, Xidian University, Xi’an; 710071, China
  • [ 2 ] [You, Zhichao]The Engineering Research Center of Blockchain Technology Application and Evaluation, Ministry of Education, Xi’an; 710071, China
  • [ 3 ] [You, Zhichao]The Shaanxi Key Laboratory of Blockchain and Secure Computing, Xi’an; 710071, China
  • [ 4 ] [Dong, Xuewen]The School of Computer Science and Technology, Xidian University, Xi’an; 710071, China
  • [ 5 ] [Dong, Xuewen]The Engineering Research Center of Blockchain Technology Application and Evaluation, Ministry of Education, Xi’an; 710071, China
  • [ 6 ] [Dong, Xuewen]The Shaanxi Key Laboratory of Blockchain and Secure Computing, Xi’an; 710071, China
  • [ 7 ] [Li, Shujun]The School of Computing, The Institute of Cyber Security for Society (iCSS), University of Kent, Canterbury; CT2 7NP, United Kingdom
  • [ 8 ] [Liu, Ximeng]The College of Computer and Data Science, Fuzhou University, Fuzhou; 350108, China
  • [ 9 ] [Ma, Siqi]The School of System and Computing, The University of New South Wales, Canberra; ACT; 2612, Australia
  • [ 10 ] [Shen, Yulong]The School of Computer Science and Technology, Xidian University, Xi’an; 710071, China
  • [ 11 ] [Shen, Yulong]The Shaanxi Key Laboratory of Network and System Security, Xi’an; 710071, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Information Forensics and Security

ISSN: 1556-6013

Year: 2025

Volume: 20

Page: 1519-1534

6 . 3 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 4

Affiliated Colleges:

Online/Total:1677/9537996
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1