{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T07:11:02Z","timestamp":1758438662605,"version":"3.44.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032051844"},{"type":"electronic","value":"9783032051851"}],"license":[{"start":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T00:00:00Z","timestamp":1758326400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T00:00:00Z","timestamp":1758326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05185-1_45","type":"book-chapter","created":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T23:46:41Z","timestamp":1758325601000},"page":"463-473","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PRADA: Protecting and\u00a0Detecting Dataset Abuse for\u00a0Open-Source Medical Dataset"],"prefix":"10.1007","author":[{"given":"Jinhyeok","family":"Jang","sequence":"first","affiliation":[]},{"given":"Hong Joo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Nassir","family":"Navab","sequence":"additional","affiliation":[]},{"given":"Seong Tae","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,20]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Aghakhani, H., Meng, D., Wang, Y.X., Kruegel, C., Vigna, G.: Bullseye polytope: a scalable clean-label poisoning attack with improved transferability. In: EuroS &P, pp. 159\u2013178 (2021)","key":"45_CR1","DOI":"10.1109\/EuroSP51992.2021.00021"},{"unstructured":"Arpit, D., et\u00a0al.: A closer look at memorization in deep networks. In: International Conference on Machine Learning, pp. 233\u2013242. PMLR (2017)","key":"45_CR2"},{"unstructured":"Baluja, S.: Hiding images in plain sight: deep steganography. In: NeurIPS, pp. 2066\u20132076 (2017)","key":"45_CR3"},{"unstructured":"Chu, T., et al.: SFT memorizes, RL generalizes: a comparative study of foundation model post-training. arXiv preprint arXiv:2501.17161 (2025)","key":"45_CR4"},{"unstructured":"Fumero, F., Sigut, J., Alay\u00f3n, Silvia, Gonz\u00e1lez-Hern\u00e1ndez, M., Gonz\u00e1lez de\u00a0la Rosa, M.: Interactive tool and database for optic disc and cupsegmentation of stereo and monocular retinal fundus images (2015)","key":"45_CR5"},{"unstructured":"Geiping, J., et al.: Witches\u2019 brew: Industrial scale data poisoning via gradient matching. In: ICLR (2021)","key":"45_CR6"},{"key":"45_CR7","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., Liu, K., Dolan-Gavitt, B., Garg, S.: BadNets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"issue":"5","key":"45_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3236009","volume":"51","author":"R Guidotti","year":"2018","unstructured":"Guidotti, R., Monreale, A., Ruggieri, S., Turini, F., Giannotti, F., Pedreschi, D.: A survey of methods for explaining black box models. ACM Comput. Surv. (CSUR) 51(5), 1\u201342 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"doi-asserted-by":"publisher","unstructured":"Hatamizadeh, A., Nath, V., Tang, Y., Yang, D., Roth, H.R., Xu, D.: Swin UNETR: Swin transformers for semantic segmentation of brain tumors in MRI images. In: International MICCAI Brainlesion Workshop, pp. 272\u2013284. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-031-08999-2_22","key":"45_CR9","DOI":"10.1007\/978-3-031-08999-2_22"},{"doi-asserted-by":"crossref","unstructured":"Huang, C., Li, Y., Loy, C.C., Tang, X.: Learning deep representation for imbalanced classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5375\u20135384 (2016)","key":"45_CR10","DOI":"10.1109\/CVPR.2016.580"},{"key":"45_CR11","first-page":"12080","volume":"33","author":"WR Huang","year":"2020","unstructured":"Huang, W.R., Geiping, J., Fowl, L., Taylor, G., Goldstein, T.: MetaPoison: practical general-purpose clean-label data poisoning. NeurIPS 33, 12080\u201312091 (2020)","journal-title":"NeurIPS"},{"doi-asserted-by":"publisher","unstructured":"Jang, J., Han, B., Kim, J., Youn, C.H.: Rethinking data bias: dataset copyright protection via embedding class-wise hidden bias. In: European Conference on Computer Vision, pp. 1\u201318. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-72664-4_1","key":"45_CR12","DOI":"10.1007\/978-3-031-72664-4_1"},{"unstructured":"Lan, H., Gu, J., Torr, P., Zhao, H.: Influencer backdoor attack on semantic segmentation. In: The Twelfth International Conference on Learning Representations","key":"45_CR13"},{"unstructured":"Li, Y., Bai, Y., Jiang, Y., Yang, Y., Xia, S.T., Li, B.: Untargeted backdoor watermark: towards harmless and stealthy dataset copyright protection. In: NeurIPS (2022)","key":"45_CR14"},{"issue":"3","key":"45_CR15","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1109\/TMI.2020.3046692","volume":"40","author":"Z Li","year":"2020","unstructured":"Li, Z., Kamnitsas, K., Glocker, B.: Analyzing overfitting under class imbalance in neural networks for image segmentation. IEEE Trans. Med. Imaging 40(3), 1065\u20131077 (2020)","journal-title":"IEEE Trans. Med. Imaging"},{"doi-asserted-by":"crossref","unstructured":"Liu, Z., Miao, Z., Zhan, X., Wang, J., Gong, B., Yu, S.X.: Large-scale long-tailed recognition in an open world. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2537\u20132546 (2019)","key":"45_CR16","DOI":"10.1109\/CVPR.2019.00264"},{"key":"45_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2019.101570","volume":"59","author":"JI Orlando","year":"2020","unstructured":"Orlando, J.I., et al.: Refuge challenge: a unified framework for evaluating automated methods for glaucoma assessment from fundus photographs. Med. Image Anal. 59, 101570 (2020)","journal-title":"Med. Image Anal."},{"issue":"3","key":"45_CR18","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek an introduction to steganography. IEEE Secur. Priv. 1(3), 32\u201344 (2003)","journal-title":"IEEE Secur. Priv."},{"issue":"5","key":"45_CR19","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1038\/s42256-019-0048-x","volume":"1","author":"C Rudin","year":"2019","unstructured":"Rudin, C.: Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead. Nat. Mach. Intell. 1(5), 206\u2013215 (2019)","journal-title":"Nat. Mach. Intell."},{"doi-asserted-by":"crossref","unstructured":"Saha, A., Subramanya, A., Pirsiavash, H.: Hidden trigger backdoor attacks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a034, pp. 11957\u201311965 (2020)","key":"45_CR20","DOI":"10.1609\/aaai.v34i07.6871"},{"doi-asserted-by":"crossref","unstructured":"Sandler, M., Howard, A., Zhu, M., Zhmoginov, A., Chen, L.C.: Mobilenetv2: inverted residuals and linear bottlenecks. In: CVPR (2018)","key":"45_CR21","DOI":"10.1109\/CVPR.2018.00474"},{"unstructured":"Schwarzschild, A., Goldblum, M., Gupta, A., Dickerson, J.P., Goldstein, T.: Just how toxic is data poisoning? A unified benchmark for backdoor and data poisoning attacks. In: ICML, pp. 9389\u20139398 (2021)","key":"45_CR22"},{"unstructured":"Shafahi, A., et al.: Poison frogs! Targeted clean-label poisoning attacks on neural networks. In: NeurIPS, vol. 31 (2018)","key":"45_CR23"},{"doi-asserted-by":"crossref","unstructured":"Sivaswamy, J., Krishnadas, S., Joshi, G.D., Jain, M., Tabish, A.U.S.: Drishti-GS: retinal image dataset for optic nerve head (ONH) segmentation. In: 2014 IEEE 11th International Symposium on Biomedical Imaging (ISBI), pp. 53\u201356. IEEE (2014)","key":"45_CR24","DOI":"10.1109\/ISBI.2014.6867807"},{"key":"45_CR25","first-page":"19165","volume":"35","author":"H Souri","year":"2022","unstructured":"Souri, H., Fowl, L., Chellappa, R., Goldblum, M., Goldstein, T.: Sleeper agent: scalable hidden trigger backdoors for neural networks trained from scratch. NeurIPS 35, 19165\u201319178 (2022)","journal-title":"NeurIPS"},{"key":"45_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41095-021-0261-5","volume":"8","author":"W Wang","year":"2022","unstructured":"Wang, W., et al.: PVT v2: improved baselines with pyramid vision transformer. Comput. Vis. Media 8, 1\u201310 (2022)","journal-title":"Comput. Vis. Media"},{"issue":"9\u201310","key":"45_CR27","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24(9\u201310), 1613\u20131626 (2003)","journal-title":"Pattern Recogn. Lett."},{"unstructured":"Xiao, H., Rasul, K., Vollgraf, R.: Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017)","key":"45_CR28"},{"issue":"1","key":"45_CR29","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1038\/s41597-022-01721-8","volume":"10","author":"J Yang","year":"2023","unstructured":"Yang, J., et al.: MedMNIST v2-a large-scale lightweight benchmark for 2D and 3D biomedical image classification. Sci. Data 10(1), 41 (2023)","journal-title":"Sci. Data"},{"unstructured":"Zhang, Z., et al.: ORIGA: an online retinal fundus image database for glaucoma analysis and research. In: Proceedings of the 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology, pp. 3065\u20133068 (2010)","key":"45_CR30"}],"container-title":["Lecture Notes in Computer Science","Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05185-1_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T23:46:50Z","timestamp":1758325610000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05185-1_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,20]]},"ISBN":["9783032051844","9783032051851"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05185-1_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,9,20]]},"assertion":[{"value":"20 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"MICCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Medical Image Computing and Computer-Assisted Intervention","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Daejeon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"miccai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.miccai.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}