VMask: tunable label privacy protection for vertical federated learning via layer masking
Juntao TAN , Lan ZHANG , Zhonghao HU , Kai YANG , Peng RAN , Bo LI
Front. Comput. Sci. ›› 2027, Vol. 21 ›› Issue (2) : 2102325
Though vertical federated learning (VFL) is generally considered to be privacy-preserving, recent studies have shown that VFL system is vulnerable to label inference attacks originating from various attack surfaces. Among these attacks, the model completion (MC) attack is currently the most powerful one. Existing defense methods against it either sacrifice model accuracy or incur impractical computational overhead. In this paper, we propose VMask, a novel label privacy protection framework designed to defend against MC attack from the perspective of layer masking. Our key insight is to disrupt the strong correlation between input data and intermediate outputs by applying the secret sharing (SS) technique to mask layer parameters in the attacker’s model. We devise a strategy for selecting critical layers to mask, reducing the overhead that would arise from naively applying SS to the entire model. Moreover, VMask is the first framework to offer a tunable privacy budget to defenders, allowing for flexible control over the levels of label privacy according to actual requirements. We built a VFL system, implemented VMask on it, and extensively evaluated it using five model architectures and 13 datasets with different modalities, comparing it to 12 other defense methods. The results demonstrate that VMask achieves the best privacy-utility trade-off, successfully thwarting the MC attack (reducing the label inference accuracy to a random guessing level) while preserving model performance (e.g., in Transformer-based model, the averaged drop of VFL model accuracy is only 0.09%). VMask’s runtime is up to 60,846 times faster than cryptography-based methods, and it only marginally exceeds that of standard VFL by 1.8 times in a large Transformer-based model, which is generally acceptable.
vertical federated learning / label inference attack / privacy protection
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
|
| [10] |
|
| [11] |
|
| [12] |
|
| [13] |
|
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
|
| [18] |
Cai S, Chai D, Yang L, Zhang J, Jin Y, Wang L, Guo K, Chen K. Secure forward aggregation for vertical federated neural networks. In: Proceedings of the 1st International Workshop on Trustworthy Federated Learning. 2022, 115−129 |
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
|
| [23] |
|
| [24] |
|
| [25] |
|
| [26] |
|
| [27] |
|
| [28] |
|
| [29] |
|
| [30] |
|
| [31] |
|
| [32] |
|
| [33] |
|
| [34] |
China Academy of Information and Communications Technology. Research report on practical applications of federated learning. 2022 |
| [35] |
|
| [36] |
|
| [37] |
|
| [38] |
|
| [39] |
|
| [40] |
BrownBatman T. Calculate the output size in convolution layer. 2018 |
| [41] |
|
| [42] |
|
| [43] |
|
| [44] |
|
| [45] |
|
| [46] |
|
| [47] |
Voorhees E M, Tice D M. The TREC-8 question answering track evaluation. In: Proceedings of the 8th Text REtrieval Conference. 1999 |
| [48] |
|
| [49] |
|
| [50] |
Gu H, Luo J, Kang Y, Fan L, Yang Q. FedPass: Privacy-preserving vertical federated deep learning with adaptive obfuscation. In: Proceedings of the 32nd International Joint Conference on Artificial Intelligence, IJCAI-23. 2023, 418 |
| [51] |
|
| [52] |
|
| [53] |
|
| [54] |
Python Software Foundation. Python socket library. 2025 |
| [55] |
|
| [56] |
|
| [57] |
|
| [58] |
Li Q, Diao Y, Chen Q, He B. Federated learning on non-IID data silos: an experimental study. In: Proceedings of the 38th IEEE International Conference on Data Engineering (ICDE). 2022, 965−978 |
| [59] |
|
| [60] |
|
| [61] |
|
| [62] |
|
| [63] |
|
| [64] |
|
| [65] |
|
| [66] |
|
| [67] |
|
| [68] |
|
Higher Education Press
/
| 〈 |
|
〉 |