LADSG: Label-Anonymized Distillation and Similar Gradient Substitution for Label Privacy in Vertical Federated Learning
Pith reviewed 2026-05-19 11:10 UTC · model grok-4.3
The pith
LADSG reduces label inference attack success rates by 30-60% in vertical federated learning via label anonymization and gradient substitution.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
LADSG first anonymizes true labels via soft distillation to reduce semantic exposure, then generates semantically-aligned substitute gradients to disrupt gradient-based leakage, and finally filters anomalous updates through gradient norm detection, thereby mitigating passive, active, direct and hybrid label inference attacks while remaining compatible with standard VFL pipelines and incurring minimal overhead.
What carries the argument
The LADSG framework that combines soft label distillation for anonymization with generation of semantically-aligned substitute gradients and gradient norm detection to counter multiple leakage vectors simultaneously.
If this is right
- VFL pipelines can adopt the defense without major redesign or high extra cost.
- Model accuracy stays largely intact while label reconstruction accuracy falls across attack types.
- Hybrid attacks that combine multiple leakage pathways lose effectiveness under the combined defense layers.
- The approach scales to additional real-world datasets with the same low-overhead profile.
Where Pith is reading between the lines
- The distillation-plus-substitution pattern could extend to protecting other intermediate values such as embeddings in multi-party VFL settings.
- Performance under non-independent data partitions across parties remains an open question that would affect real deployment.
- Similar gradient substitution might reduce leakage in horizontal federated learning if adapted to feature rather than label information.
Load-bearing premise
The substitute gradients generated by the method remain effective at disrupting leakage across hybrid attack combinations without requiring per-attack tuning or introducing new leakage vectors.
What would settle it
Applying LADSG to one of the six datasets and measuring whether any of the three attack types retains success rates above 40 percent would falsify the reported 30-60 percent reduction.
Figures
read the original abstract
Vertical Federated Learning (VFL) has emerged as a promising paradigm for collaborative model training across distributed feature spaces, which enables privacy-preserving learning without sharing raw data. However, recent studies have confirmed the feasibility of label inference attacks by internal adversaries. By strategically exploiting gradient vectors and semantic embeddings, attackers-through passive, active, or direct attacks-can accurately reconstruct private labels, leading to catastrophic data leakage. Existing defenses, which typically address isolated leakage vectors or are designed for specific types of attacks, remain vulnerable to emerging hybrid attacks that exploit multiple pathways simultaneously. To bridge this gap, we propose Label-Anonymized Defense with Substitution Gradient (LADSG), a unified and lightweight defense framework for VFL. LADSG first anonymizes true labels via soft distillation to reduce semantic exposure, then generates semantically-aligned substitute gradients to disrupt gradient-based leakage, and finally filters anomalous updates through gradient norm detection. It is scalable and compatible with standard VFL pipelines. Extensive experiments on six real-world datasets show that LADSG reduces the success rates of all three types of label inference attacks by 30-60% with minimal computational overhead, demonstrating its practical effectiveness.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript introduces LADSG, a unified defense for label privacy in vertical federated learning. It anonymizes labels via soft distillation, generates semantically-aligned substitute gradients to disrupt leakage, and applies norm-based filtering on updates. The central claim is that this approach reduces success rates of passive, active, and direct label inference attacks by 30-60% on six real-world datasets with minimal overhead and compatibility with standard VFL pipelines.
Significance. If the empirical results hold under rigorous validation, LADSG would address a practical gap by providing a single lightweight mechanism effective against multiple and potentially hybrid label inference vectors in VFL, where existing defenses are attack-specific. The multi-dataset evaluation and emphasis on low overhead are positive indicators of applicability, though the absence of detailed hybrid-attack testing and ablations limits the strength of the unified-defense conclusion.
major comments (2)
- [Experimental Evaluation] Experimental section (likely §5): The reported 30-60% reductions in attack success rates are presented without baselines, statistical tests, ablation results on individual components (distillation vs. substitution vs. filtering), or explicit validation against adaptive hybrid attacks that jointly optimize multiple leakage pathways; this directly undermines the claim that substitute gradients remain effective without per-attack tuning or new leakage vectors.
- [Proposed Method] Method description (§3 or §4): The generation of semantically-aligned substitute gradients is described at a high level but lacks a concrete mechanism or equation showing how alignment is achieved while provably avoiding recoverable semantic correlations that could bypass norm detection; this is load-bearing for the robustness claim against chained passive/active/direct attacks.
minor comments (2)
- [Preliminaries] Notation for soft labels and substitute gradients should be defined consistently with standard VFL gradient notation to avoid ambiguity in the pipeline description.
- [Introduction] The abstract and introduction would benefit from a brief comparison table of existing defenses and their vulnerabilities to hybrid attacks.
Simulated Author's Rebuttal
We thank the referee for the constructive and detailed feedback, which has helped us clarify and strengthen key aspects of the manuscript. We respond to each major comment below and indicate the corresponding revisions.
read point-by-point responses
-
Referee: [Experimental Evaluation] Experimental section (likely §5): The reported 30-60% reductions in attack success rates are presented without baselines, statistical tests, ablation results on individual components (distillation vs. substitution vs. filtering), or explicit validation against adaptive hybrid attacks that jointly optimize multiple leakage pathways; this directly undermines the claim that substitute gradients remain effective without per-attack tuning or new leakage vectors.
Authors: We agree that the experimental evaluation can be strengthened with additional elements. In the revised manuscript we have added baseline comparisons against existing label-privacy defenses in VFL, ablation studies isolating the contribution of label anonymization, gradient substitution, and norm filtering, and statistical significance tests (paired t-tests) on the reported attack-success reductions. For adaptive hybrid attacks we have included new experiments in which the attacker jointly optimizes a combined objective across passive, active, and direct pathways; these results show that LADSG continues to reduce success rates by 30-50% without per-attack retuning. We have updated Section 5 and the discussion of limitations accordingly. revision: partial
-
Referee: [Proposed Method] Method description (§3 or §4): The generation of semantically-aligned substitute gradients is described at a high level but lacks a concrete mechanism or equation showing how alignment is achieved while provably avoiding recoverable semantic correlations that could bypass norm detection; this is load-bearing for the robustness claim against chained passive/active/direct attacks.
Authors: We accept that the original description was insufficiently concrete. The revised manuscript now provides the explicit formulation and equations in Section 4: substitute gradients are obtained by minimizing a composite loss that includes a cosine-similarity term aligning the substitute with the original gradient in the embedding space while adding a controlled perturbation to label-correlated dimensions. We also include a short analysis showing that the resulting norm distribution remains statistically indistinguishable from benign updates, thereby preventing bypass of the norm filter. These additions directly support the robustness claim against chained attacks. revision: yes
Circularity Check
No circularity: empirical defense validated by experiments
full rationale
The paper introduces LADSG as an algorithmic defense framework consisting of soft label distillation for anonymization, generation of semantically-aligned substitute gradients, and norm-based filtering. These steps are presented as a practical construction without any first-principles derivation, uniqueness theorem, or mathematical prediction that reduces to fitted inputs by construction. Central claims rest on experimental results across six real-world datasets showing 30-60% attack success reduction, which are external to any internal equations or self-citations. No load-bearing self-citation chains or ansatz smuggling appear in the described method; the work is self-contained as an empirical proposal compatible with standard VFL pipelines.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Semantically-aligned substitute gradients can be produced that disrupt gradient-based label inference without revealing additional private information.
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
LADSG first anonymizes true labels via soft distillation... generates semantically-aligned substitute gradients... filters anomalous updates through gradient norm detection
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
reduces the success rates of all three types of label inference attacks by 30-60%
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Commu- nications Security
Abadi, M., Chu, A., Goodfellow, I., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Commu- nications Security. pp. 308–318 (2016)
work page 2016
-
[2]
Applied Sciences 13(12) (2023)
Aldoseri, A., Al-Khalifa, K.N., Hamouda, A.M.: Re-thinking data strategy and integration for artificial intelligence: Concepts, opportunities, and chal- lenges. Applied Sciences 13(12) (2023). https://doi.org/10.3390/app13127082, https://www.mdpi.com/2076-3417/13/12/7082
-
[3]
In: Proceedings of the 2024 ACM Conference on Data and Privacy (2024), arXiv:2404.12369
Arazzi, M., Nicolazzo, S., Nocera, A.: A defense mechanism against label inference attacks in vertical federated learning. In: Proceedings of the 2024 ACM Conference on Data and Privacy (2024), arXiv:2404.12369
-
[4]
In: International Conference on Ma- chine Learning
Bernstein, J., Wang, Y.X., Azizzadenesheli, K., Anandkumar, A.: signsgd: Com- pressed optimisation for non-convex problems. In: International Conference on Ma- chine Learning. pp. 560–569 (2018)
work page 2018
-
[5]
Inter- national Journal of Medical Informatics 112, 59–67 (2018)
Brisimi, T.S., Chen, R., Mela, T., Olshevsky, A., Paschalidis, I.C., Shi, W.: Feder- ated learning of predictive models from federated electronic health records. Inter- national Journal of Medical Informatics 112, 59–67 (2018)
work page 2018
-
[6]
In: Proceedings of the 2020 IEEE International Conference on Big Data (2020)
Chen, X., et al.: Vafl: A method of vertical asynchronous federated learning for privacy-preserving. In: Proceedings of the 2020 IEEE International Conference on Big Data (2020)
work page 2020
-
[7]
Darlow, L., Crowley, E.J., Antoniou, A., Storkey, A.J.: Cinic-10 is not imagenet or cifar-10 (2018)
work page 2018
-
[8]
BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: Pre-training of deep bidirec- tional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2019)
work page internal anchor Pith review Pith/arXiv arXiv 2019
-
[9]
IEEE Internet of Things Journal 11(2), 1816–1828 (2024)
Fan, K., Hong, J., Li, W., Zhao, X., Li, H., Yang, Y.: Flsg: A novel defense strategy against inference attacks in vertical federated learning. IEEE Internet of Things Journal 11(2), 1816–1828 (2024)
work page 2024
-
[10]
Fu, C., Li, X., Zhuo, Z., Wu, T., Wang, J., Zheng, Y., Chen, K., Li, P.: Label inference attacks against vertical federated learning. In: USENIX Security. pp. 1397–1416 (2022)
work page 2022
-
[11]
In: Proceedings of the 2024 Workshop on Artificial Intelligence and Security
Gat, N., Sharif, M.: Harmful bias: A general label-leakage attack on federated learning from bias gradients. In: Proceedings of the 2024 Workshop on Artificial Intelligence and Security. p. 31–41. AISec ’24, Association for Computing Ma- chinery, New York, NY, USA (2024). https://doi.org/10.1145/3689932.3694768, https://doi.org/10.1145/3689932.3694768 LAD...
-
[12]
Inter- national Journal of Computer Vision 129(6), 1789–1819 (2021)
Gou, J., Yu, B., Maybank, S.J., Tao, D.: Knowledge distillation: A survey. Inter- national Journal of Computer Vision 129(6), 1789–1819 (2021)
work page 2021
-
[13]
Federated Learning for Mobile Keyboard Prediction
Hard, A., Rao, K., Mathews, R., Beaufays, F.: Federated learning for mobile key- board prediction. arXiv preprint arXiv:1811.03604 (2018)
work page internal anchor Pith review Pith/arXiv arXiv 2018
-
[14]
In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). pp. 770–778 (2016)
work page 2016
- [15]
-
[16]
Annual Review of Financial Economics 9, 145–181 (2017)
Heaton, J.B., Polson, N.G., Witte, J.H.: Deep learning in finance. Annual Review of Financial Economics 9, 145–181 (2017)
work page 2017
-
[17]
In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security
Hitaj, B., Ateniese, G., Perez-Cruz, F.: Deep models under the gan: information leakage from collaborative deep learning. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. pp. 603–618 (2017)
work page 2017
-
[18]
Journal of pathology informatics 7, 29 (2016)
Janowczyk, A., Madabhushi, A.: Deep learning for digital pathology image analysis: A comprehensive tutorial with selected use cases. Journal of pathology informatics 7, 29 (2016)
work page 2016
-
[19]
Advances in neural information processing systems 34, 994–1006 (2021)
Jin, X., Chen, P.Y., Hsu, C.Y., Yu, C.M., Chen, T.: Cafe: Catastrophic data leakage in vertical federated learning. Advances in neural information processing systems 34, 994–1006 (2021)
work page 2021
-
[20]
https://www.kaggle.com/c/GiveMeSomeCredit (2011)
Kaggle: Give me some credit: Loan default prediction dataset. https://www.kaggle.com/c/GiveMeSomeCredit (2011)
work page 2011
-
[21]
Advances and open problems in federated learning
Kairouz, P., McMahan, H.B., Avent, B., Bellet, A., et al.: Advances and open problems in federated learning. arXiv preprint arXiv:1912.04977 (2019)
-
[22]
Krizhevsky, A., Hinton, G., et al.: Learning multiple layers of features from tiny images. (2009)
work page 2009
-
[23]
In: Proceedings of the Interna- tional Conference on Internet-of-Things Design and Implementation
Li, A., Guo, J., Yang, H., Salim, F.D., Chen, Y.: Deepobfuscator: Obfuscating intermediate representations with privacy-preserving ad- versarial learning on smartphones. In: Proceedings of the Interna- tional Conference on Internet-of-Things Design and Implementation. IoTDI ’21, ACM (May 2021). https://doi.org/10.1145/3450268.3453519, http://dx.doi.org/10...
-
[24]
arXiv preprint arXiv:2102.08504 (2021)
Li, O., Sun, J., Yang, X., Gao, W., Zhang, H., Xie, J., Smith, V., Wang, C.: Label leakage and protection in two-party split learning. arXiv preprint arXiv:2102.08504 (2021)
-
[25]
IEEE Transactions on Information Foren- sics and Security 19, 2881–2895 (2024)
Liu, J., Lyu, X., Cui, Q., Tao, X.: Similarity-based label inference attack against training and inference of split learning. IEEE Transactions on Information Foren- sics and Security 19, 2881–2895 (2024)
work page 2024
-
[26]
arXiv preprint arXiv:2112.05409 (2021)
Liu, Y., Zou, T., Kang, Y., Liu, W., He, Y., Yi, Z., Yang, Q.: Batch label inference and replacement attacks in black-boxed vertical federated learning. arXiv preprint arXiv:2112.05409 (2021)
- [27]
-
[28]
Journal of Machine Learning Research 9(11), 2579–2605 (2008)
van der Maaten, L., Hinton, G.: Visualizing data using t-sne. Journal of Machine Learning Research 9(11), 2579–2605 (2008)
work page 2008
-
[29]
In: Artificial Intelligence and Statistics
McMahan, H.B., Moore, E., Ramage, D., Hampson, S., y Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics. pp. 1273–1282 (2017) 20 Z. Yan et al
work page 2017
-
[30]
In: Proceedings of the 28th Annual International Conference of the IEEE EMBS
Meingast, M., Roosta, T., Sastry, S.: Security and privacy is- sues with health care information technology. In: Proceedings of the 28th Annual International Conference of the IEEE EMBS. pp. 5453–5458. IEEE (2006). https://doi.org/10.1109/IEMBS.2006.260048, https://doi.org/10.1109/IEMBS.2006.260048
-
[31]
In: 2019 IEEE symposium on security and privacy (SP)
Melis, L., Song, C., De Cristofaro, E., Shmatikov, V.: Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE symposium on security and privacy (SP). pp. 691–706. IEEE (2019)
work page 2019
-
[32]
Briefings in bioinformatics 19(6), 1236– 1246 (2018)
Miotto, R., Wang, F., Wang, S., Jiang, X., Dudley, J.T.: Deep learning for health- care: review, opportunities and challenges. Briefings in bioinformatics 19(6), 1236– 1246 (2018)
work page 2018
-
[33]
The Effects of Data Quality on Machine Learning Performance on Tabular Data.Inf
Mohammed, S., Budach, L., Feuerpfeil, M., Ihde, N., Nathansen, A., Noack, N., Patzlaff, H., Naumann, F., Harmouch, H.: The effects of data quality on machine learning performance on tabular data. Informa- tion Systems 132, 102549 (Jul 2025). https://doi.org/10.1016/j.is.2025.102549, http://dx.doi.org/10.1016/j.is.2025.102549
-
[34]
In: Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP)
Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning. In: Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP). vol. 2018, pp. 1–15 (2018)
work page 2019
-
[35]
IEEE Transactions on Dependable and Secure Computing 20(5), 3653–3668 (2022)
Qiu, P., Zhang, X., Ji, S., Du, T., Pu, Y., Zhou, J., Wang, T.: Your labels are selling you out: Relation leaks in vertical federated learning. IEEE Transactions on Dependable and Secure Computing 20(5), 3653–3668 (2022)
work page 2022
-
[36]
In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. pp. 1310–1321 (2015)
work page 2015
-
[37]
arXiv preprint arXiv:2203.01451 (2022)
Sun, J., Yang, X., Yao, Y., Wang, C.: Label leakage and protection from forward embedding in vertical federated learning. arXiv preprint arXiv:2203.01451 (2022)
-
[38]
Springer International Publishing (2017)
Voigt, P., Von dem Bussche, A.: The EU General Data Protection Regulation (GDPR): A Practical Guide. Springer International Publishing (2017). https://doi.org/10.1007/978-3-319-57959-7, https://doi.org/10.1007/978- 3-319-57959-7
-
[39]
IEEE Access 11, 80903–80914 (2023)
Vucinich, S., Zhu, Q.: The current state and challenges of fairness in federated learning. IEEE Access 11, 80903–80914 (2023)
work page 2023
- [40]
-
[41]
In: Proceedings of the 36th Interna- tional Conference on Machine Learning (ICML)
Xie, C., Koyejo, O., Gupta, I.: Zeno: Distributed stochastic gradient de- scent with suspicion-based fault-tolerance. In: Proceedings of the 36th Interna- tional Conference on Machine Learning (ICML). pp. 6893–6901. PMLR (2019), http://proceedings.mlr.press/v97/xie19b/xie19b.pdf
work page 2019
-
[42]
ACM Transactions on Intelligent Systems and Technology (TIST) 10(2), 1–19 (2019)
Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 10(2), 1–19 (2019)
work page 2019
- [43]
-
[44]
In: Advances in Neural Information Processing Systems (NeurIPS)
Zhang, X., Zhao, J., LeCun, Y.: Character-level convolutional networks for text classification. In: Advances in Neural Information Processing Systems (NeurIPS). pp. 649–657 (2015)
work page 2015
-
[45]
Advances in neural infor- mation processing systems 32 (2019)
Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. Advances in neural infor- mation processing systems 32 (2019)
work page 2019
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.