2020
DOI: 10.1109/jsac.2020.3000372
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing User-Level Privacy Attack Against Federated Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
81
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 187 publications
(81 citation statements)
references
References 23 publications
0
81
0
Order By: Relevance
“…To meet the constraints of accuracy, memory, and energy in IoT end devices, models with mixed-precision are constructed. The paper titled "Analyzing User-Level Privacy Attack Against Federated Learning," by Song et al, focuses on attacks by a malicious server [16]. The authors introduce an attack framework called mGAN-AI that is based on Generative Adversarial Networks (GANs).…”
Section: The Selected Papersmentioning
confidence: 99%
See 3 more Smart Citations
“…To meet the constraints of accuracy, memory, and energy in IoT end devices, models with mixed-precision are constructed. The paper titled "Analyzing User-Level Privacy Attack Against Federated Learning," by Song et al, focuses on attacks by a malicious server [16]. The authors introduce an attack framework called mGAN-AI that is based on Generative Adversarial Networks (GANs).…”
Section: The Selected Papersmentioning
confidence: 99%
“…Many works apply deep learning methods, which are based on neural networks [2]- [5], [8]- [10], [13], [15], [16]. Some papers use methods based on Recurrent Neural Networks (RNNs), specifically Long Short-Term Memory (LSTM) [5], [8].…”
Section: The Selected Papersmentioning
confidence: 99%
See 2 more Smart Citations
“…Privacy leakage is particularly serious, and many security researchers have put forward their own methods and opinions. For instance, Mengkai Song et al analyzed the problem of users' privacy being leaked due to malicious attacks on servers [3]. Vulnerability analysis of IoT devices is a prerequisite for reducing IoT security threats, and IoT devices identification technology is the predominate method of IoT devices vulnerability analysis.…”
Section: Introductionmentioning
confidence: 99%