{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:42:06Z","timestamp":1743010926923,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031106835"},{"type":"electronic","value":"9783031106842"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10684-2_1","type":"book-chapter","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:05:06Z","timestamp":1657609506000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Assessing Differentially Private Variational Autoencoders Under Membership Inference"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Bernau","sequence":"first","affiliation":[]},{"given":"Jonas","family":"Robl","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Kerschbaum","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,13]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the Conference on Computer and Communications Security CCS (2016)","key":"1_CR1","DOI":"10.1145\/2976749.2978318"},{"doi-asserted-by":"crossref","unstructured":"Bernau, D., Robl, J., Grassal, P.W., Schneider, S., Kerschbaum, F.: Comparing local and central differential privacy using membership inference attacks. In: Proceedings of Conference on Data and Applications Security and Privacy. DBSEC (2021)","key":"1_CR2","DOI":"10.1007\/978-3-030-81242-3_2"},{"doi-asserted-by":"crossref","unstructured":"Bernau, D., Robl, J., Kerschbaum, F.: Assessing differentially private variational autoencoders under membership inference (2022)","key":"1_CR3","DOI":"10.1007\/978-3-031-10684-2_1"},{"unstructured":"Carlini, N., Liu, C., Erlingsson, U., Kos, J., Song, D.: The secret sharer. In: Proceedings of USENIX Security Symposium (2019)","key":"1_CR4"},{"unstructured":"Chen, D., Yu, N., Zhang, Y., Fritz, M.: GAN-leaks. In: Proceedings of Conference on Computer and Communications Security. CCS (2020)","key":"1_CR5"},{"doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: Proceedings of Colloquium on Automata, Languages and Programming. ICALP (2006)","key":"1_CR6","DOI":"10.1007\/11787006_1"},{"issue":"3\u20134","key":"1_CR7","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Fan, L.: Image pixelization with differential privacy. In: Proceedings of Conference on Data and Applications Security and Privacy. DBSec (2018)","key":"1_CR8","DOI":"10.1007\/978-3-319-95729-6_10"},{"doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of Conference on Computer and Communications Security. CCS (2015)","key":"1_CR9","DOI":"10.1145\/2810103.2813677"},{"doi-asserted-by":"crossref","unstructured":"Frigerio, L., de Oliveira, A.S., Gomez, L., Duverger, P.: Differentially private generative adversarial networks for time series, continuous, and discrete open data. In: Proceedings of Conference on ICT Systems Security and Privacy Protection (2019)","key":"1_CR10","DOI":"10.1007\/978-3-030-22312-0_11"},{"unstructured":"Hayes, J., Melis, L., Danezis, G., De Cristofaro, E.: LOGAN. In: Proceedings on Privacy Enhancing Technologies. PETS (2019)","key":"1_CR11"},{"doi-asserted-by":"crossref","unstructured":"Hilprecht, B., H\u00e4rterich, M., Bernau, D.: Monte Carlo and reconstruction membership inference attacks against generative models. In: Proceedings on Privacy Enhancing Technologies. PETS (2019)","key":"1_CR12","DOI":"10.2478\/popets-2019-0067"},{"doi-asserted-by":"crossref","unstructured":"Hou, X., Shen, L., Sun, K., Qiu, G.: Deep feature consistent variational autoencoder. In: Proceedings of Conference on Applications of Computer Vision. WACV (2017)","key":"1_CR13","DOI":"10.1109\/WACV.2017.131"},{"unstructured":"Huang, G.B., Mattar, M., Lee, H., Learned-Miller, E.: Learning to align from scratch. In: Proceedings of Conference on Neural Information Processing Systems. NIPS (2012)","key":"1_CR14"},{"unstructured":"Jayaraman, B., Evans, D.: Evaluating differentially private machine learning in practice. In: Proceedings of USENIX Security Symposium (2019)","key":"1_CR15"},{"unstructured":"Jordon, J., Yoon, J., Schaar, M.V.D.: PATE-GAN. In: Proceedings of Conference on Learning Representations. ICLR (2019)","key":"1_CR16"},{"issue":"3","key":"1_CR17","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1137\/090756090","volume":"40","author":"SP Kasiviswanathan","year":"2008","unstructured":"Kasiviswanathan, S.P., Lee, H.K., Nissim, K., Raskhodnikova, S., Smith, A.: What can we learn privately? SIAM J. Comput. 40(3), 793\u2013826 (2008)","journal-title":"SIAM J. Comput."},{"unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes. In: Proceedings of Conference on Learning Representations. ICLR (2014)","key":"1_CR18"},{"unstructured":"Lucas, J., Tucker, G., Grosse, R.B., Norouzi, M.: Dont blame the ELBO! A linear VAE perspective on posterior collapse. In: Proceedings of Conference on Neural Information Processing Systems. NIPS (2019)","key":"1_CR19"},{"doi-asserted-by":"crossref","unstructured":"Malekzadeh, M., Clegg, R.G., Cavallaro, A., Haddadi, H.: Protecting sensory data against sensitive inferences. In: Proceedings of Workshop on Privacy by Design in Distributed Systems. W-P2ds (2018)","key":"1_CR20","DOI":"10.1145\/3195258.3195260"},{"doi-asserted-by":"crossref","unstructured":"Mironov, I.: R\u00e9nyi differential privacy. In: Proceedings of Computer Security Foundations Symposium (CSF) (2017)","key":"1_CR21","DOI":"10.1109\/CSF.2017.11"},{"unstructured":"Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning. In: Proceedings of Symposium on Security and Privacy. S &P (2019)","key":"1_CR22"},{"unstructured":"Papernot, N., Song, S., Mironov, I., Raghunathan, A., Talwar, K., Erlingsson, \u00da.: Scalable private learning with PATE. In: Proceedings of Conference on Learning Representations. ICLR (2018)","key":"1_CR23"},{"unstructured":"Saeed, A.: Implementing a CNN for Human Activity Recognition in Tensorflow. http:\/\/aqibsaeed.github.io\/2016-11-04-human-activity-recognition-cnn\/","key":"1_CR24"},{"doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: Proceedings of Symposium on Security and Privacy. S &P (2017)","key":"1_CR25","DOI":"10.1109\/SP.2017.41"},{"unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: Proceedings of Conference on Learning Representations. ICLR (2015)","key":"1_CR26"},{"unstructured":"Takahashi, T., Takagi, S., Ono, H., Komatsu, T.: Differentially Private Variational Autoencoders with Term-wise Gradient Aggregation (2020)","key":"1_CR27"},{"unstructured":"Torkzadehmahani, R., Kairouz, P., Paten, B.: DP-CGAN. In: Proceedings of Conference on Computer Vision and Pattern Recognition Workshops. CVPRW (2019)","key":"1_CR28"},{"unstructured":"Wang, T., Blocki, J., Li, N., Jha, S.: Locally differentially private protocols for frequency estimation. In: Proceedings of USENIX Security Symposium (2017)","key":"1_CR29"},{"unstructured":"Weggenmann, B., Rublack, V., Andrejczuk, M., Mattern, J., Kerschbaum, F.: DP-VAE. In: Proceedings of Web Conference. WWW (2022)","key":"1_CR30"},{"doi-asserted-by":"crossref","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Proceedings of Conference on Neural Information Processing Systems. NeurIPS (2019)","key":"1_CR31","DOI":"10.1007\/978-3-030-63076-8_2"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10684-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T10:30:12Z","timestamp":1676111412000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10684-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031106835","9783031106842"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10684-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"13 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Newark, NJ","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cs.iit.edu\/~dbsec2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}