{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:17:33Z","timestamp":1759331853162,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031198205"},{"type":"electronic","value":"9783031198212"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19821-2_21","type":"book-chapter","created":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T12:12:59Z","timestamp":1666440779000},"page":"365-381","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning"],"prefix":"10.1007","author":[{"given":"Xinlei","family":"He","sequence":"first","affiliation":[]},{"given":"Hongbin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,23]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep Learning with differential privacy. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 308\u2013318. ACM (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"21_CR2","unstructured":"Berthelot, D., Carlini, N., Goodfellow, I.J., Papernot, N., Oliver, A., Raffel, C.: MixMatch: a holistic approach to semi-supervised learning. In: Annual Conference on Neural Information Processing Systems (NeurIPS). NeurIPS (2019)"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Carlini, N., Chien, S., Nasr, M., Song, S., Terzis, A., Tram\u00e8r, F.: Membership inference attacks from first principles. CoRR abs\/2112.03570 (2021)","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Chen, D., Yu, N., Zhang, Y., Fritz, M.: GAN-Leaks: A taxonomy of membership inference attacks against generative models. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 343\u2013362. ACM (2020)","DOI":"10.1145\/3372297.3417238"},{"key":"21_CR5","unstructured":"Choo, C.A.C., Tram\u00e8r, F., Carlini, N., Papernot, N.: Label-only membership inference attacks. In: International Conference on Machine Learning (ICML), pp. 1964\u20131974. PMLR (2021)"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Cubuk, E.D., Zoph, B., Shlens, J., Le, Q.: RandAugment: practical automated data augmentation with a reduced search space. In: Annual Conference on Neural Information Processing Systems (NeurIPS), pp. 18613\u201318624. NeurIPS (2020)","DOI":"10.1109\/CVPRW50498.2020.00359"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1322\u20131333. ACM (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"21_CR8","unstructured":"He, X., Wen, R., Wu, Y., Backes, M., Shen, Y., Zhang, Y.: Node-level membership inference attacks against graph neural networks. CoRR abs\/2102.05429 (2021)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"He, X., Zhang, Y.: Quantifying and mitigating privacy risks of contrastive learning. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 845\u2013863. ACM (2021)","DOI":"10.1145\/3460120.3484571"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/978-3-030-58592-1_31","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Y He","year":"2020","unstructured":"He, Y., Rahimian, S., Schiele, B., Fritz, M.: Segmentations-Leak: membership inference attacks and defenses in semantic image segmentation. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12368, pp. 519\u2013535. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58592-1_31"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Hui, B., Yang, Y., Yuan, H., Burlina, P., Gong, N.Z., Cao, Y.: Practical blind membership inference attack via differential comparisons. In: Network and Distributed System Security Symposium (NDSS). Internet Society (2021)","DOI":"10.14722\/ndss.2021.24293"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Jia, J., Salem, A., Backes, M., Zhang, Y., Gong, N.Z.: MemGuard: defending against black-box membership inference attacks via adversarial examples. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 259\u2013274. ACM (2019)","DOI":"10.1145\/3319535.3363201"},{"key":"21_CR13","unstructured":"Lee, D.H.: Pseudo-label: the simple and efficient semi-supervised learning method for deep neural networks. In: ICML Workshop on Challenges in Representation Learning (WREPL). ICML (2013)"},{"key":"21_CR14","unstructured":"Leino, K., Fredrikson, M.: Stolen memories: leveraging model memorization for calibrated white-box membership inference. In: USENIX Security Symposium (USENIX Security), pp. 1605\u20131622. USENIX (2020)"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhang, Y.: Membership leakage in label-only exposures. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 880\u2013895. ACM (2021)","DOI":"10.1145\/3460120.3484575"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Liu, H., Jia, J., Qu, W., Gong, N.Z.: EncoderMI: membership inference against pre-trained encoders in contrastive learning. In: ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM (2021)","DOI":"10.1145\/3460120.3484749"},{"issue":"8","key":"21_CR17","doi-asserted-by":"publisher","first-page":"1979","DOI":"10.1109\/TPAMI.2018.2858821","volume":"41","author":"T Miyato","year":"2019","unstructured":"Miyato, T., Maeda, S., Koyama, M., Ishii, S.: Virtual adversarial training: a regularization method for supervised and semi-supervised learning. IEEE Trans. Pattern Anal. Mach. Intell. 41(8), 1979\u20131993 (2019)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Nasr, M., Shokri, R., Houmansadr, A.: Machine learning with membership privacy using adversarial regularization. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 634\u2013646. ACM (2018)","DOI":"10.1145\/3243734.3243855"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. In: IEEE Symposium on Security and Privacy (S &P), pp. 1021\u20131035. IEEE (2019)","DOI":"10.1109\/SP.2019.00065"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Oh, S.J., Augustin, M., Schiele, B., Fritz, M.: Towards reverse-engineering black-box neural networks. In: International Conference on Learning Representations (ICLR) (2018)","DOI":"10.1007\/978-3-030-28954-6_7"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Pyrgelis, A., Troncoso, C., Cristofaro, E.D.: Knock Knock, Who\u2019s there? Membership inference on aggregate location data. In: Network and Distributed System Security Symposium (NDSS). Internet Society (2018)","DOI":"10.14722\/ndss.2018.23183"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Rahimian, S., Orekondy, T., Fritz, M.: Differential privacy defenses and sampling attacks for membership inference. In: PriML Workshop (PriML). NeurIPS (2020)","DOI":"10.1145\/3474369.3486876"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Salem, A., Zhang, Y., Humbert, M., Berrang, P., Fritz, M., Backes, M.: ML-Leaks: model and data independent membership inference attacks and defenses on machine learning models. In: Network and Distributed System Security Symposium (NDSS). Internet Society (2019)","DOI":"10.14722\/ndss.2019.23119"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: IEEE Symposium on Security and Privacy (S &P), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"21_CR25","unstructured":"Sohn, K., et al.: FixMatch: simplifying semi-supervised learning with consistency and confidence. In: Annual Conference on Neural Information Processing Systems (NeurIPS). NeurIPS (2020)"},{"key":"21_CR26","unstructured":"Song, C., Shmatikov, V.: Overlearning reveals sensitive attributes. In: International Conference on Learning Representations (ICLR) (2020)"},{"key":"21_CR27","unstructured":"Song, L., Mittal, P.: Systematic evaluation of privacy risks of machine learning models. In: USENIX Security Symposium (USENIX Security). USENIX (2021)"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Song, L., Shokri, R., Mittal, P.: Privacy risks of securing machine learning models against adversarial examples. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 241\u2013257. ACM (2019)","DOI":"10.1145\/3319535.3354211"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Wang, B., Gong, N.Z.: Stealing hyperparameters in machine learning. In: IEEE Symposium on Security and Privacy (S &P), pp. 36\u201352. IEEE (2018)","DOI":"10.1109\/SP.2018.00038"},{"key":"21_CR30","unstructured":"Watson, L., Guo, C., Cormode, G., Sablayrolles, A.: On the importance of difficulty calibration in membership inference attacks. CoRR abs\/2111.08440 (2021)"},{"key":"21_CR31","unstructured":"Xie, Q., Dai, Z., Du, Y., Hovy, E.H., Neubig, G.: Controllable invariance through adversarial feature learning. In: Annual Conference on Neural Information Processing Systems (NIPS), pp. 585\u2013596. NIPS (2017)"},{"key":"21_CR32","unstructured":"Xie, Q., Dai, Z., Hovy, E.H., Luong, T., Le, Q.: Unsupervised data augmentation for consistency training. In: Annual Conference on Neural Information Processing Systems (NeurIPS). NeurIPS (2020)"},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Yeom, S., Giacomelli, I., Fredrikson, M., Jha, S.: Privacy risk in machine learning: analyzing the connection to overfitting. In: IEEE Computer Security Foundations Symposium (CSF), pp. 268\u2013282. IEEE (2018)","DOI":"10.1109\/CSF.2018.00027"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. In: Proceedings of the British Machine Vision Conference (BMVC). BMVA Press (2016)","DOI":"10.5244\/C.30.87"},{"key":"21_CR35","unstructured":"Zhang, B., et al.: FlexMatch: boosting semi-supervised learning with curriculum pseudo labeling. In: Annual Conference on Neural Information Processing Systems (NeurIPS). NeurIPS (2021)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19821-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T12:53:00Z","timestamp":1666443180000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19821-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031198205","9783031198212"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19821-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tel Aviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2022.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5804","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1645","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.21","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.91","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}