{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:25:32Z","timestamp":1742970332069,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031730030"},{"type":"electronic","value":"9783031730047"}],"license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73004-7_9","type":"book-chapter","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T17:02:14Z","timestamp":1730394134000},"page":"140-157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the\u00a0Vulnerability of\u00a0Skip Connections to\u00a0Model Inversion Attacks"],"prefix":"10.1007","author":[{"given":"Koh Jun","family":"Hao","sequence":"first","affiliation":[]},{"given":"Sy-Tuyen","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Ngoc-Bao","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Ngai-Man","family":"Cheung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,1]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"An, S., et al.: Mirror: model inversion for deep learning network with high fidelity. In: Proceedings of the 29th Network and Distributed System Security Symposium (2022)","DOI":"10.14722\/ndss.2022.24335"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Cazenavette, G., Murdock, C., Lucey, S.: Architectural adversarial robustness: the case for deep pursuit. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7150\u20137158 (2021)","DOI":"10.1109\/CVPR46437.2021.00707"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Chang, X., Zhang, W., Qian, Y., Le\u00a0Roux, J., Watanabe, S.: End-to-end multi-speaker speech recognition with transformer. In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6134\u20136138. IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9054029"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Chen, S., Kahla, M., Jia, R., Qi, G.J.: Knowledge-enriched distributional model inversion attacks. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 16178\u201316187 (2021)","DOI":"10.1109\/ICCV48922.2021.01587"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Ding, X., Zhang, X., Ma, N., Han, J., Ding, G., Sun, J.: Repvgg: making vgg-style convnets great again. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13733\u201313742 (2021)","DOI":"10.1109\/CVPR46437.2021.01352"},{"key":"9_CR6","unstructured":"Dippel, J., Vogler, S., H\u00f6hne, J.: Towards fine-grained visual representations by combining contrastive learning with image reconstruction and attention-weighted pooling. arXiv preprint arXiv:2104.04323 (2021)"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-030-87196-3_6","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2021","author":"B Dufumier","year":"2021","unstructured":"Dufumier, B., et al.: Contrastive learning with continuous proxy meta-data for 3D MRI classification. In: de Bruijne, M., et al. (eds.) MICCAI 2021. LNCS, vol. 12902, pp. 58\u201368. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-87196-3_6"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322\u20131333 (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"9_CR9","unstructured":"Fredrikson, M., Lantz, E., Jha, S., Lin, S., Page, D., Ristenpart, T.: Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 17\u201332 (2014)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Guo, J., Zhu, X., Zhao, C., Cao, D., Lei, Z., Li, S.Z.: Learning meta face recognition in unseen domains. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6163\u20136172 (2020)","DOI":"10.1109\/CVPR42600.2020.00620"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Han, G., Choi, J., Lee, H., Kim, J.: Reinforcement learning-based black-box model inversion attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20504\u201320513 (2023)","DOI":"10.1109\/CVPR52729.2023.01964"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der\u00a0Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700\u20134708 (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Huang, Y., et al.: Curricularface: adaptive curriculum learning loss for deep face recognition. In: proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5901\u20135910 (2020)","DOI":"10.1109\/CVPR42600.2020.00594"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Kahla, M., Chen, S., Just, H.A., Jia, R.: Label-only model inversion attacks via boundary repulsion. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15045\u201315053 (2022)","DOI":"10.1109\/CVPR52688.2022.01462"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4401\u20134410 (2019)","DOI":"10.1109\/CVPR.2019.00453"},{"key":"9_CR17","unstructured":"Khosla, A., Jayadevaprakash, N., Yao, B., Fei-Fei, L.: Novel dataset for fine-grained image categorization. In: First Workshop on Fine-Grained Visual Categorization, IEEE Conference on Computer Vision and Pattern Recognition. Colorado Springs, CO (2011)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Krishna, G., Tran, C., Yu, J., Tewfik, A.H.: Speech recognition with no speech or with noisy speech. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1090\u20131094. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8683453"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3730\u20133738 (2015)","DOI":"10.1109\/ICCV.2015.425"},{"key":"9_CR20","doi-asserted-by":"publisher","unstructured":"Luo, L., Xu, D., Chen, H., Wong, T.T., Heng, P.A.: Pseudo bias-balanced learning for debiased chest x-ray classification. In: International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 621\u2013631. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-16452-1_59","DOI":"10.1007\/978-3-031-16452-1_59"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Meng, Q., Zhao, S., Huang, Z., Zhou, F.: Magface: a universal representation for face recognition and quality assessment. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14225\u201314234 (2021)","DOI":"10.1109\/CVPR46437.2021.01400"},{"key":"9_CR22","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/978-3-031-16431-6_68","volume-title":"MICCAI 2022","author":"S Mishra","year":"2022","unstructured":"Mishra, S., Zhang, Y., Zhang, L., Zhang, T., Hu, X.S., Chen, D.Z.: Data-driven deep supervision for skin lesion classification. In: Wang, L., Dou, Q., Fletcher, P.T., Speidel, S., Li, S. (eds.) MICCAI 2022, pp. 721\u2013731. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-16431-6_68"},{"key":"9_CR23","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/978-3-031-16443-9_62","volume-title":"MICCAI 2022","author":"P M\u00fcller","year":"2022","unstructured":"M\u00fcller, P., Kaissis, G., Zou, C., Rueckert, D.: Radiological reports improve pre-training for localized imaging tasks on chest x-rays. In: Wang, L., Dou, Q., Fletcher, P.T., Speidel, S., Li, S. (eds.) MICCAI 2022, pp. 647\u2013657. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-16443-9_62"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Ng, H.W., Winkler, S.: A data-driven approach to cleaning large face datasets. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 343\u2013347. IEEE (2014)","DOI":"10.1109\/ICIP.2014.7025068"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Nguyen, N.B., Chandrasegaran, K., Abdollahzadeh, M., Cheung, N.M.: Re-thinking model inversion attacks against deep neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023)","DOI":"10.1109\/CVPR52729.2023.01572"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Peng, X., et al.: Bilateral dependency optimization: defending against model-inversion attacks. In: KDD (2022)","DOI":"10.1145\/3534678.3539376"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"9_CR28","unstructured":"Struppek, L., Hintersdorf, D., Correia, A.D.A., Adler, A., Kersting, K.: Plug & play attacks: towards robust and flexible model inversion attacks. arXiv preprint arXiv:2201.12179 (2022)"},{"key":"9_CR29","unstructured":"Tan, M., Le, Q.: Efficientnet: rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning, pp. 6105\u20136114. PMLR (2019)"},{"key":"9_CR30","doi-asserted-by":"publisher","unstructured":"Tu, Z., et al.: Maxvit: multi-axis vision transformer. In: European Conference on Computer Vision, pp. 459\u2013479. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-20053-3_27","DOI":"10.1007\/978-3-031-20053-3_27"},{"key":"9_CR31","first-page":"9706","volume":"34","author":"KC Wang","year":"2021","unstructured":"Wang, K.C., Fu, Y., Li, K., Khisti, A., Zemel, R., Makhzani, A.: Variational model inversion attacks. Adv. Neural. Inf. Process. Syst. 34, 9706\u20139719 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Wang, T., Zhang, Y., Jia, R.: Improving robustness to model inversion attacks via mutual information regularization. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a035, pp. 11666\u201311673 (2021)","DOI":"10.1609\/aaai.v35i13.17387"},{"key":"9_CR33","unstructured":"Wu, D., Wang, Y., Xia, S.T., Bailey, J., Ma, X.: Skip connections matter: on the transferability of adversarial examples generated with resnets. arXiv preprint arXiv:2002.05990 (2020)"},{"key":"9_CR34","unstructured":"Yang, J., Chen, H., Yan, J., Chen, X., Yao, J.: Towards better understanding and better generalization of few-shot classification in histology images with contrastive learning (2022)"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Yang, S., Li, Y., Jiang, Y., Xia, S.T.: Backdoor defense via suppressing model shortcuts. In: ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135. IEEE (2023)","DOI":"10.1109\/ICASSP49357.2023.10097220"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Yang, Z., Zhang, J., Chang, E.C., Liang, Z.: Neural network inversion in adversarial setting via background knowledge alignment. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 225\u2013240 (2019)","DOI":"10.1145\/3319535.3354261"},{"key":"9_CR37","unstructured":"Yosinski, J., Clune, J., Bengio, Y., Lipson, H.: How transferable are features in deep neural networks? Adv. Neural Inf. Process. Syst. 27 (2014)"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Yuan, X., Chen, K., Zhang, J., Zhang, W., Yu, N., Zhang, Y.: Pseudo label-guided model inversion attack via conditional generative adversarial network. In: Thirty Seventh AAAI Conference on Artificial Intelligence (AAAI 23) (2023)","DOI":"10.1609\/aaai.v37i3.25442"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Jia, R., Pei, H., Wang, W., Li, B., Song, D.: The secret revealer: generative model-inversion attacks against deep neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 253\u2013261 (2020)","DOI":"10.1109\/CVPR42600.2020.00033"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73004-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T17:06:20Z","timestamp":1730394380000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73004-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,1]]},"ISBN":["9783031730030","9783031730047"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73004-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,1]]},"assertion":[{"value":"1 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}