{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T01:15:51Z","timestamp":1746321351718,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031702440"},{"type":"electronic","value":"9783031702457"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70245-7_27","type":"book-chapter","created":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:18:02Z","timestamp":1725999482000},"page":"391-398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Black-Box Reconstruction Attacks on\u00a0LLMs: A Preliminary Study in\u00a0Code Summarization"],"prefix":"10.1007","author":[{"given":"Marco","family":"Russodivito","sequence":"first","affiliation":[]},{"given":"Angelica","family":"Spina","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Scalabrino","sequence":"additional","affiliation":[]},{"given":"Rocco","family":"Oliveto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"27_CR1","unstructured":"Al-Kaswan, A., Izadi, M., van Deursen, A.: Targeted attack on GPT-neo for the SATML language model data extraction challenge. arXiv:2302.07735 (2023)"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Al-Kaswan, A., Izadi, M., Van\u00a0Deursen, A.: Traces of memorisation in large language models for code. In: IEEE\/ACM International Conference on Software Engineering, pp. 1\u201312 (2024)","DOI":"10.1145\/3597503.3639133"},{"key":"27_CR3","unstructured":"Carlini, N., Liu, C., Erlingsson, \u00da., Kos, J., Song, D.: The secret sharer: evaluating and testing unintended memorization in neural networks. In: USENIX Security Symposium, pp. 267\u2013284 (2019)"},{"key":"27_CR4","unstructured":"Carlini, N., et\u00a0al.: Extracting training data from large language models. In: USENIX Security Symposium, pp. 2633\u20132650 (2021)"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1322\u20131333 (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"27_CR6","unstructured":"Fredrikson, M., Lantz, E., Jha, S., Lin, S., Page, D., Ristenpart, T.: Privacy in pharmacogenetics: an $$\\{$$End-to-End$$\\}$$ case study of personalized warfarin dosing. In: USENIX Security Symposium, pp. 17\u201332 (2014)"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Ganju, K., Wang, Q., Yang, W., Gunter, C.A., Borisov, N.: Property inference attacks on fully connected neural networks using permutation invariant representations. In: Computer and Communications Security Conference, pp. 619\u2013633 (2018)","DOI":"10.1145\/3243734.3243834"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Haque, S., LeClair, A., Wu, L., McMillan, C.: Improved automatic summarization of subroutines via attention to file context. In: International Conference on Mining Software Repositories, pp. 300\u2013310 (2020)","DOI":"10.1145\/3379597.3387449"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Hidano, S., Murakami, T., Katsumata, S., Kiyomoto, S., Hanaoka, G.: Model inversion attacks for prediction systems: without knowledge of non-sensitive attributes. In: IEEE International Conference on Privacy, Security, and Trust, pp. 115\u201311509 (2017)","DOI":"10.1109\/PST.2017.00023"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Ateniese, G., Perez-Cruz, F.: Deep models under the GAN: information leakage from collaborative deep learning. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 603\u2013618 (2017)","DOI":"10.1145\/3133956.3134012"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Hu, X., Li, G., Xia, X., Lo, D., Jin, Z.: Deep code comment generation. In: IEEE\/ACM International Conference on Program Comprehension, pp. 200\u2013210 (2018)","DOI":"10.1145\/3196321.3196334"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Hu, X., Li, G., Xia, X., Lo, D., Lu, S., Jin, Z.: Summarizing source code with transferred API knowledge. In: International Joint Conference on Artificial Intelligence, pp. 2269\u20132275 (2018)","DOI":"10.24963\/ijcai.2018\/314"},{"key":"27_CR13","unstructured":"Husain, H., Wu, H.H., Gazit, T., Allamanis, M., Brockschmidt, M.: Codesearchnet challenge: evaluating the state of semantic code search. arXiv:1909.09436 (2019)"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Mastropaolo, A., et al.: Studying the usage of text-to-text transfer transformer to support code-related tasks. In: IEEE\/ACM International Conference on Software Engineering, pp. 336\u2013347 (2021)","DOI":"10.1109\/ICSE43902.2021.00041"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Papineni, K., Roukos, S., Ward, T., Zhu, W.J.: BLEU: a method for automatic evaluation of machine translation. In: Annual Meeting of the ACL, pp. 311\u2013318 (2002)","DOI":"10.3115\/1073083.1073135"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Parikh, R., Dupuy, C., Gupta, R.: Canary extraction in natural language understanding models. In: Annual Meeting of the ACL (2022)","DOI":"10.18653\/v1\/2022.acl-short.61"},{"issue":"1","key":"27_CR17","first-page":"5485","volume":"21","author":"C Raffel","year":"2020","unstructured":"Raffel, C., et al.: Exploring the limits of transfer learning with a unified text-to-text transformer. J. Mach. Learn. Res. (JMLR) 21(1), 5485\u20135551 (2020)","journal-title":"J. Mach. Learn. Res. (JMLR)"},{"issue":"4","key":"27_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3624010","volume":"56","author":"M Rigaki","year":"2023","unstructured":"Rigaki, M., Garcia, S.: A survey of privacy attacks in machine learning. ACM Comput. Surv. 56(4), 1\u201334 (2023)","journal-title":"ACM Comput. Surv."},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: IEEE Symposium on Security and Privacy (SP), pp. 3\u201318 (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"27_CR20","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: USENIX Security Symposium, pp. 601\u2013618 (2016)"},{"key":"27_CR21","unstructured":"Vaswani, A., et al.: Attention is all you need. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Yang, Z., et al.: Unveiling memorization in code models. In: IEEE\/ACM International Conference on Software Engineering, pp. 856\u2013856 (2024)","DOI":"10.1145\/3597503.3639074"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Yang, Z., Zhang, J., Chang, E.C., Liang, Z.: Neural network inversion in adversarial setting via background knowledge alignment. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 225\u2013240 (2019)","DOI":"10.1145\/3319535.3354261"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Jia, R., Pei, H., Wang, W., Li, B., Song, D.: The secret revealer: generative model-inversion attacks against deep neural networks. In: IEEE\/CVF Computer Vision and Pattern Recognition Conference, pp. 253\u2013261 (2020)","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Wen, J., Huang, M.: ETHICIST: targeted training data extraction through loss smoothed soft prompting and calibrated confidence estimation. In: Annual Meeting of the ACL (2023)","DOI":"10.18653\/v1\/2023.acl-long.709"},{"issue":"3","key":"27_CR26","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/3633453","volume":"67","author":"A Ziegler","year":"2024","unstructured":"Ziegler, A., et al.: Measuring github copilot\u2019s impact on productivity. Commun. ACM 67(3), 54\u201363 (2024)","journal-title":"Commun. ACM"}],"container-title":["Communications in Computer and Information Science","Quality of Information and Communications Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70245-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T23:53:40Z","timestamp":1732751620000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70245-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031702440","9783031702457"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70245-7_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QUATIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Quality of Information and Communications Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pisa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"quatic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.quatic.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}