{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:13:36Z","timestamp":1755998016014,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031139444"},{"type":"electronic","value":"9783031139451"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-13945-1_19","type":"book-chapter","created":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T23:02:54Z","timestamp":1663110174000},"page":"269-282","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Membership Inference Attack Against Principal Component Analysis"],"prefix":"10.1007","author":[{"given":"Oualid","family":"Zari","sequence":"first","affiliation":[]},{"given":"Javier","family":"Parra-Arnau","sequence":"additional","affiliation":[]},{"given":"Ay\u015fe","family":"\u00dcnsal","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]},{"given":"Melek","family":"\u00d6nen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,14]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, Vienna, Austria, pp. 308\u2013318. Association for Computing Machinery (2016). ISBN: 9781450341394. https:\/\/doi.org\/10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"key":"19_CR2","unstructured":"Balcan, M.-F., et al.: Improved distributed principal component analysis. In: Proceedings of the 27th International Conference on Neural Information Processing Systems, NIPS 2014, Montreal, Canada, vol. 2, pp. 3113\u20133121. MIT Press (2014)"},{"key":"19_CR3","unstructured":"Blanco-Justicia, A., et al.: A critical review on the use (and misuse) of differential privacy in machine learning (2022). https:\/\/arxiv.org\/abs\/2206.04621"},{"key":"19_CR4","unstructured":"Brand, R., Domingo-Ferrer, J., Mateo-Sanz, J.M.: Reference data sets to test and compare SDC methods for protection of numerical microdata. Technical report. https:\/\/research.cbs.nl\/casc\/CASCrefmicrodata.pdf"},{"issue":"3\u20134","key":"19_CR5","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014). ISSN: 1551-305X","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"19_CR6","doi-asserted-by":"publisher","unstructured":"Dwork, C., et al.: Analyze gauss: optimal bounds for privacy-preserving principal component analysis. In: Proceedings of the Forty-Sixth Annual ACM Symposium on Theory of Computing, STOC 2014, pp. 11\u201320. Association for Computing Machinery, New York (2014). ISBN: 9781450327107. https:\/\/doi.org\/10.1145\/2591796.2591883","DOI":"10.1145\/2591796.2591883"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"e1000167","DOI":"10.1371\/journal.pgen.1000167","volume":"4","author":"N Homer","year":"2008","unstructured":"Homer, N., et al.: Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet. 4, e1000167 (2008)","journal-title":"PLoS Genet."},{"key":"19_CR8","unstructured":"Huang, G.B., et al.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report 07-49, University of Massachusetts, Amherst, October 2007"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Hundepool, A., et al.: Statistical Disclosure Control (2012). Ed. by S. Fischer-H\u016bbner et al.","DOI":"10.1002\/9781118348239"},{"key":"19_CR10","doi-asserted-by":"publisher","unstructured":"Imtiaz, H., Sarwate, A.D.: Differentially private distributed principal component analysis. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2206\u20132210 (2018). https:\/\/doi.org\/10.1109\/ICASSP.2018.8462519","DOI":"10.1109\/ICASSP.2018.8462519"},{"key":"19_CR11","doi-asserted-by":"publisher","unstructured":"Imtiaz, H., Sarwate, A.D.: Symmetric matrix perturbation for differentially-private principal component analysis. In: 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2339\u20132343, March 2016. https:\/\/doi.org\/10.1109\/ICASSP.2016.7472095","DOI":"10.1109\/ICASSP.2016.7472095"},{"key":"19_CR12","unstructured":"Jayaraman, B., Evans, D.E.: Evaluating differentially private machine learning in practice. In: USENIX Security Symposium (2019)"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Jayaraman, B., et al.: Revisiting membership inference under realistic assumptions. In: Proceedings on Privacy Enhancing Technologies 2021, pp. 348\u2013368 (2021)","DOI":"10.2478\/popets-2021-0031"},{"key":"19_CR14","unstructured":"LeCun, Y., Cortes, C.: MNIST handwritten digit database (2010). http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"19_CR15","unstructured":"Long, Y., et al.: Understanding membership inferences on well-generalized learning models. ArXiv, abs\/1802.04889 (2018)"},{"key":"19_CR16","unstructured":"Blake, C.L., Newman, D.J., Merz, C.J.: UCI repository of machine learning databases (1998). http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"key":"19_CR17","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.inffus.2019.06.011","volume":"53","author":"J Parra-Arnau","year":"2020","unstructured":"Parra-Arnau, J., Domingo-Ferrer, J., Soria-Comas, J.: Differentially private data publishing via cross-moment microaggregation. Inf. Fusion 53, 269\u2013288 (2020). ISSN: 1566-2535","journal-title":"Inf. Fusion"},{"issue":"11","key":"19_CR18","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1080\/14786440109462720","volume":"2","author":"K Pearson","year":"1901","unstructured":"Pearson, K.: On lines and planes of closest fit to systems of points in space. Philos. Mag. 2(11), 559\u2013572 (1901)","journal-title":"Philos. Mag."},{"key":"19_CR19","first-page":"61","volume":"11","author":"MA Rahman","year":"2018","unstructured":"Rahman, M.A., et al.: Membership inference attack against differentially private deep learning model. Trans. Data Priv. 11, 61\u201379 (2018)","journal-title":"Trans. Data Priv."},{"key":"19_CR20","unstructured":"Sablayrolles, A.: White-box vs black-box: bayes optimal strategies for membership inference. In: ICML (2019)"},{"key":"19_CR21","unstructured":"Salem, A., et al.: ML-Leaks: model and data independent membership inference attacks and defenses on machine learning models. CoRR, abs\/1806.01246 (2018). http:\/\/arxiv.org\/abs\/1806.01246"},{"key":"19_CR22","unstructured":"Shokri, R., Stronati, M., Shmatikov, V.: Membership inference attacks against machine learning models. CoRR, abs\/1610.05820 (2016). http:\/\/arxiv.org\/abs\/1610.05820"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Song, L., Shokri, R., Mittal, P.: Membership inference attacks against adversarially robust deep learning models. In: 2019 IEEE Security and Privacy Workshops (SPW), pp. 50\u201356 (2019)","DOI":"10.1109\/SPW.2019.00021"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Tram\u00e8r, F., et al.: Truth serum: poisoning machine learning models to reveal their secrets. ArXiv, abs\/2204.00032 (2022)","DOI":"10.1145\/3548606.3560554"},{"key":"19_CR25","doi-asserted-by":"publisher","first-page":"2073","DOI":"10.1109\/TSC.2019.2897554","volume":"14","author":"S Truex","year":"2021","unstructured":"Truex, S., et al.: Demystifying membership inference attacks in machine learning as a service. IEEE Trans. Serv. Comput. 14, 2073\u20132089 (2021)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Truex, S., et al.: Effects of differential privacy and data skewness on membership inference vulnerability. In: 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 82\u201391 (2019)","DOI":"10.1109\/TPS-ISA48467.2019.00019"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Yeom, S., et al.: Privacy risk in machine learning: analyzing the connection to overfitting. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), pp. 268\u2013282 (2018)","DOI":"10.1109\/CSF.2018.00027"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Ying, Z., Zhang, Y., Liu, X.: Privacy-preserving in defending against membership inference attacks. In: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice (2020)","DOI":"10.1145\/3411501.3419428"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Zari, O., et al.: Membership inference attack against principal component analysis (2022). https:\/\/www.eurecom.fr\/index.php\/en\/publication\/6913","DOI":"10.1007\/978-3-031-13945-1_19"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-13945-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T11:39:03Z","timestamp":1710329943000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-13945-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031139444","9783031139451"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-13945-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Privacy in Statistical Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"psd2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crises-deim.urv.cat\/psd2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}