{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:22:43Z","timestamp":1771611763995,"version":"3.50.1"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031734106","type":"print"},{"value":"9783031734113","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T00:00:00Z","timestamp":1732320000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T00:00:00Z","timestamp":1732320000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73411-3_7","type":"book-chapter","created":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T20:06:35Z","timestamp":1732305995000},"page":"109-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A Closer Look at\u00a0GAN Priors: Exploiting Intermediate Features for\u00a0Enhanced Model Inversion Attacks"],"prefix":"10.1007","author":[{"given":"Yixiang","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Hao","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Hongyao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"MeiKang","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Shu-Tao","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,23]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Abdal, R., Qin, Y., Wonka, P.: Image2stylegan: how to embed images into the stylegan latent space? In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4432\u20134441 (2019)","DOI":"10.1109\/ICCV.2019.00453"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"An, S., et al.: Mirror: model inversion for deep learning network with high fidelity. In: NDSS (2022)","DOI":"10.14722\/ndss.2022.24335"},{"key":"7_CR3","unstructured":"Bau, D., et al.: Gan dissection: visualizing and understanding generative adversarial networks. arXiv preprint arXiv:1811.10597 (2018)"},{"issue":"2","key":"7_CR4","doi-asserted-by":"publisher","first-page":"1388","DOI":"10.1109\/TPAMI.2022.3165024","volume":"45","author":"B Chen","year":"2022","unstructured":"Chen, B., et al.: Adversarial examples generation for deep product quantization networks on image retrieval. IEEE Trans. Pattern Anal. Mach. Intell. 45(2), 1388\u20131404 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Chen, S., Kahla, M., Jia, R., Qi, G.J.: Knowledge-enriched distributional model inversion attacks. In: ICCV (2021)","DOI":"10.1109\/ICCV48922.2021.01587"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Choi, Y., Uh, Y., Yoo, J., Ha, J.W.: Stargan v2: diverse image synthesis for multiple domains. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8188\u20138197 (2020)","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Conneau, A., Baevski, A., Collobert, R., Mohamed, A., Auli, M.: Unsupervised cross-lingual representation learning for speech recognition. arXiv preprint arXiv:2006.13979 (2020)","DOI":"10.21437\/Interspeech.2021-329"},{"key":"7_CR8","unstructured":"Daras, G., Dean, J., Jalal, A., Dimakis, A.G.: Intermediate layer optimization for inverse problems using deep generative models. arXiv preprint arXiv:2102.07364 (2021)"},{"key":"7_CR9","unstructured":"Dataset, E.: Novel datasets for fine-grained image categorization. In: First Workshop on Fine Grained Visual Categorization, CVPR. Citeseer. Citeseer. Citeseer (2011)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Fang, H., Chen, B., Wang, X., Wang, Z., Xia, S.T.: GIFD: a generative gradient inversion method with feature domain optimization. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4967\u20134976 (2023)","DOI":"10.1109\/ICCV51070.2023.00458"},{"key":"7_CR11","unstructured":"Fang, H., et al.: One perturbation is enough: on generating universal adversarial perturbations against vision-language pre-training models. arXiv preprint arXiv:2406.05491 (2024)"},{"key":"7_CR12","unstructured":"Fang, H., et al.: Privacy leakage on DNNs: a survey of model inversion attacks and defenses. arXiv preprint arXiv:2402.04013 (2024)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: CCS, pp. 1322\u20131333 (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"7_CR14","unstructured":"Fredrikson, M., Lantz, E., Jha, S., Lin, S., Page, D., Ristenpart, T.: Privacy in pharmacogenetics: an $$\\{$$End-to-End$$\\}$$ case study of personalized warfarin dosing. In: USENIX Security, pp. 17\u201332 (2014)"},{"key":"7_CR15","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in neural Information Processing Systems, vol. 27 (2014)"},{"issue":"11","key":"7_CR16","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., et al.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"7_CR18","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local NASH equilibrium. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"issue":"11s","key":"7_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3523273","volume":"54","author":"H Hu","year":"2022","unstructured":"Hu, H., Salcic, Z., Sun, L., Dobbie, G., Yu, P.S., Zhang, X.: Membership inference attacks on machine learning: a survey. ACM Comput. Surv. (CSUR) 54(11s), 1\u201337 (2022)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der\u00a0Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700\u20134708 (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Kahla, M., Chen, S., Just, H.A., Jia, R.: Label-only model inversion attacks via boundary repulsion. In: CVPR (2022)","DOI":"10.1109\/CVPR52688.2022.01462"},{"key":"7_CR22","first-page":"12104","volume":"33","author":"T Karras","year":"2020","unstructured":"Karras, T., Aittala, M., Hellsten, J., Laine, S., Lehtinen, J., Aila, T.: Training generative adversarial networks with limited data. Adv. Neural. Inf. Process. Syst. 33, 12104\u201312114 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4401\u20134410 (2019)","DOI":"10.1109\/CVPR.2019.00453"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., Aila, T.: Analyzing and improving the image quality of stylegan. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8110\u20138119 (2020)","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"7_CR25","unstructured":"Kynk\u00e4\u00e4nniemi, T., Karras, T., Laine, S., Lehtinen, J., Aila, T.: Improved precision and recall metric for assessing generative models. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Li, C., Qiu, M.: Reinforcement Learning for Cyber-Physical Systems: With Cybersecurity Case Studies. Chapman and Hall\/CRC (2019)","DOI":"10.1201\/9781351006620"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3730\u20133738 (2015)","DOI":"10.1109\/ICCV.2015.425"},{"key":"7_CR28","unstructured":"Naeem, M.F., Oh, S.J., Uh, Y., Choi, Y., Yoo, J.: Reliable fidelity and diversity metrics for generative models. In: International Conference on Machine Learning, pp. 7176\u20137185. PMLR (2020)"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Ng, H.W., Winkler, S.: A data-driven approach to cleaning large face datasets. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 343\u2013347. IEEE (2014)","DOI":"10.1109\/ICIP.2014.7025068"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Nguyen, N.B., Chandrasegaran, K., Abdollahzadeh, M., Cheung, N.M.: Re-thinking model inversion attacks against deep neural networks. In: CVPR, pp. 16384\u201316393 (2023)","DOI":"10.1109\/CVPR52729.2023.01572"},{"key":"7_CR31","unstructured":"Park, J.Y., Smedemark-Margulies, N., Daniels, M., Yu, R., van\u00a0de Meent, J.W., HAnd, P.: Generator surgery for compressed sensing. In: NeurIPS 2020 Workshop on Deep Learning and Inverse Problems (2020). https:\/\/openreview.net\/forum?id=s2EucjZ6d2s"},{"issue":"13","key":"7_CR32","doi-asserted-by":"publisher","first-page":"10327","DOI":"10.1109\/JIOT.2020.3048038","volume":"8","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Dong, T., Zhang, T., Lu, J., Memmi, G., Qiu, M.: Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet Things J. 8(13), 10327\u201310335 (2020)","journal-title":"IEEE Internet Things J."},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Shen, Y., Gu, J., Tang, X., Zhou, B.: Interpreting the latent space of GANs for semantic face editing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9243\u20139252 (2020)","DOI":"10.1109\/CVPR42600.2020.00926"},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"7_CR36","doi-asserted-by":"crossref","unstructured":"Song, C., Ristenpart, T., Shmatikov, V.: Machine learning models that remember too much. In: CCS, pp. 587\u2013601 (2017)","DOI":"10.1145\/3133956.3134077"},{"key":"7_CR37","unstructured":"Struppek, L., Hintersdorf, D., Correira, A.D.A., Adler, A., Kersting, K.: Plug & play attacks: towards robust and flexible model inversion attacks. In: ICML (2022)"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818\u20132826 (2016)","DOI":"10.1109\/CVPR.2016.308"},{"issue":"6","key":"7_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3414685.3417803","volume":"39","author":"A Tewari","year":"2020","unstructured":"Tewari, A., et al.: Pie: portrait image embedding for semantic control. ACM Trans. Graphics (TOG) 39(6), 1\u201314 (2020)","journal-title":"ACM Trans. Graphics (TOG)"},{"key":"7_CR40","unstructured":"Wang, K.C., Fu, Y., Li, K., Khisti, A., Zemel, R., Makhzani, A.: Variational model inversion attacks. In: NeurIPS (2021)"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Wu, C., Yan, M.: Session-aware information embedding for e-commerce product recommendation. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pp. 2379\u20132382 (2017)","DOI":"10.1145\/3132847.3133163"},{"key":"7_CR42","doi-asserted-by":"crossref","unstructured":"Yang, Z., Zhang, J., Chang, E.C., Liang, Z.: Neural network inversion in adversarial setting via background knowledge alignment. In: CCS (2019)","DOI":"10.1145\/3319535.3354261"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"Yin, H., et al.: Dreaming to distill: Data-free knowledge transfer via deepinversion. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8715\u20138724 (2020)","DOI":"10.1109\/CVPR42600.2020.00874"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Yu, W., Chen, B., Zhang, Q., Xia, S.T.: Editable-deepsc: cross-modal editable semantic communication systems. arXiv preprint arXiv:2310.10347 (2023)","DOI":"10.1109\/VTC2024-Spring62846.2024.10683561"},{"key":"7_CR45","unstructured":"Yu, W., et al.: GI-NAS: boosting gradient inversion attacks through adaptive neural architecture search. arXiv preprint arXiv:2405.20725 (2024)"},{"key":"7_CR46","doi-asserted-by":"crossref","unstructured":"Yuan, X., Chen, K., Zhang, J., Zhang, W., Yu, N., Zhang, Y.: Pseudo label-guided model inversion attack via conditional generative adversarial network. In: AAAI (2023)","DOI":"10.1609\/aaai.v37i3.25442"},{"key":"7_CR47","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-031-20065-6_9","volume-title":"ECCV 2022","author":"Z Yuan","year":"2022","unstructured":"Yuan, Z., Wu, F., Long, Y., Xiao, C., Li, B.: Secretgen: privacy recovery on pre-trained models via distribution discrimination. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13665, pp. 139\u2013155. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20065-6_9"},{"key":"7_CR48","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Pan, M., Just, H.A., Lyu, L., Qiu, M., Jia, R.: Narcissus: a practical clean-label backdoor attack with limited information. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 771\u2013785 (2023)","DOI":"10.1145\/3576915.3616617"},{"key":"7_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, H., et\u00a0al.: Resnest: split-attention networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2736\u20132746 (2022)","DOI":"10.1109\/CVPRW56347.2022.00309"},{"key":"7_CR50","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Jia, R., Pei, H., Wang, W., Li, B., Song, D.: The secret revealer: generative model-inversion attacks against deep neural networks. In: CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"7_CR51","unstructured":"Zhong, X., et al.: Hierarchical features matter: a deep exploration of GAN priors for improved dataset distillation. arXiv preprint arXiv:2406.05704 (2024)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73411-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T21:23:17Z","timestamp":1732310597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73411-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,23]]},"ISBN":["9783031734106","9783031734113"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73411-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,23]]},"assertion":[{"value":"23 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}