{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T13:07:53Z","timestamp":1777900073084,"version":"3.51.4"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032060952","type":"print"},{"value":"9783032060969","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T00:00:00Z","timestamp":1758931200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T00:00:00Z","timestamp":1758931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06096-9_12","type":"book-chapter","created":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T09:54:29Z","timestamp":1758880469000},"page":"203-220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TAMIS: Tailored Membership Inference Attacks on Synthetic Data"],"prefix":"10.1007","author":[{"given":"Paul","family":"Andrey","sequence":"first","affiliation":[]},{"given":"Batiste","family":"Le Bars","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Tommasi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,27]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","unstructured":"Allard, T., B\u00e9ziaud, L., Gambs, S.: Snake challenge: sanitization algorithms under attack. In: Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, pp. 5010\u20135014. CIKM \u201923, Association for Computing Machinery (2023). https:\/\/doi.org\/10.1145\/3583780.3614754","DOI":"10.1145\/3583780.3614754"},{"key":"12_CR2","unstructured":"van Breugel, B., Sun, H., Qian, Z., van\u00a0der Schaar, M.: Membership inference attacks against synthetic data through overfitting detection. In: Ruiz, F., Dy, J., van\u00a0de Meent, J.W. (eds.) Proceedings of The 26th International Conference on Artificial Intelligence and Statistics. Proceedings of Machine Learning Research, vol.\u00a0206, pp. 3493\u20133514. PMLR (2023). https:\/\/proceedings.mlr.press\/v206\/breugel23a.html"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Cai, K., Lei, X., Wei, J., Xiao, X.: Data synthesis via differentially private Markov random fields. Proc. VLDB Endow. 14(11), pp. 2190\u20132202 (2021). https:\/\/doi.org\/10.14778\/3476249.3476272","DOI":"10.14778\/3476249.3476272"},{"key":"12_CR4","unstructured":"Desfontaines, D.: Empirical privacy metrics: the bad, the Ugly... and the good, maybe? In: 2024 USENIX Conference on Privacy Engineering Practice and Respect. USENIX Association, Santa Clara, CA (2024). https:\/\/www.usenix.org\/conference\/pepr24\/presentation\/desfontaines"},{"key":"12_CR5","doi-asserted-by":"publisher","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014). https:\/\/doi.org\/10.1561\/0400000042","DOI":"10.1561\/0400000042"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Giomi, M., Boenisch, F., Wehmeyer, C., Tasn\u00e1di, B.: A unified framework for quantifying privacy risk in synthetic data. Proc. Priv. Enhancing Technol. 2023, pp. 312\u2013328 (2023). https:\/\/doi.org\/10.56553\/popets-2023-0055","DOI":"10.56553\/popets-2023-0055"},{"key":"12_CR7","unstructured":"Golob, S., Pentyala, S., Maratkhan, A., Cock, M.D.: High epsilon synthetic data vulnerabilities in MST and PrivBayes (2024). https:\/\/arxiv.org\/abs\/2402.06699"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Golob, S., Pentyala, S., Maratkhan, A., Cock, M.D.: Privacy vulnerabilities in marginals-based synthetic data. In: 3rd IEEE Conference on Secure and Trustworthy Machine Learning (SaTML) (2025). https:\/\/arxiv.org\/abs\/2410.05506","DOI":"10.1109\/SaTML64287.2025.00059"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Hayes, J., Melis, L., Danezis, G., Cristofaro, E.D.: LOGAN: Membership inference attacks against generative models. Proceedings on Privacy Enhancing Technologies (2019). https:\/\/petsymposium.org\/popets\/2019\/popets-2019-0008.php","DOI":"10.2478\/popets-2019-0008"},{"issue":"4","key":"12_CR10","doi-asserted-by":"publisher","first-page":"232","DOI":"10.2478\/popets-2019-0067","volume":"2019","author":"B Hilprecht","year":"2019","unstructured":"Hilprecht, B., H\u00e4rterich, M., Bernau, D.: Monte Carlo and reconstruction membership inference attacks against generative models. Proc. Priv. Enhancing Technol. 2019(4), 232\u2013249 (2019). https:\/\/doi.org\/10.2478\/popets-2019-0067","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"12_CR11","unstructured":"Houssiau, F., et al.: A framework for auditable synthetic data generation (2022). https:\/\/arxiv.org\/abs\/2211.11540"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Houssiau, F., et al.: Prive: Empirical privacy evaluation of synthetic data generators. In: NeurIPS 2022 Workshop on Synthetic Data for Empowering ML Research (2022). https:\/\/openreview.net\/forum?id=9hXskf1K7zQ","DOI":"10.3997\/2214-4609.2022616024"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Lin, Z., Jain, A., Wang, C., Fanti, G., Sekar, V.: Using GANs for sharing networked time series data: challenges, initial promise, and open questions. In: Proceedings of the ACM Internet Measurement Conference, pp. 464\u2013483. IMC \u201920, Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3419394.3423643","DOI":"10.1145\/3419394.3423643"},{"key":"12_CR14","doi-asserted-by":"publisher","unstructured":"McKenna, R., Miklau, G., Sheldon, D.: Winning the NIST contest: a scalable and general approach to differentially private synthetic data. Journal of Privacy and Confidentiality 11(3) (2021). https:\/\/doi.org\/10.29012\/jpc.778","DOI":"10.29012\/jpc.778"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Pang, W., Shafieinejad, M., Liu, L., Hazlewood, S., He, X.: Clavaddpm: Multi-relational data synthesis with cluster-guided diffusion models. In: Globerson, A., et al. (eds.) Advances in Neural Information Processing Systems, vol.\u00a037, pp. 83521\u201383547. Curran Associates, Inc. (2024). https:\/\/doi.org\/10.48550\/arXiv.2405.17724","DOI":"10.52202\/079017-2657"},{"key":"12_CR16","doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318 (2017). https:\/\/doi.org\/10.1109\/SP.2017.41","DOI":"10.1109\/SP.2017.41"},{"key":"12_CR17","unstructured":"Stadler, T., Oprisanu, B., Troncoso, C.: Synthetic data \u2013 anonymisation groundhog day. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 1451\u20131468. USENIX Association, Boston, MA (2022). https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/stadler"},{"key":"12_CR18","doi-asserted-by":"publisher","unstructured":"Wainwright, M.J., Jordan, M.I.: Graphical models, exponential families, and variational inference. Found. Trends\u00ae Mach. Learn. 1(1\u20132), 1\u2013305 (2008). https:\/\/doi.org\/10.1561\/2200000001","DOI":"10.1561\/2200000001"},{"key":"12_CR19","unstructured":"Xie, L., Lin, K., Wang, S., Wang, F., Zhou, J.: Differentially private generative adversarial network (2018). https:\/\/arxiv.org\/abs\/1802.06739"},{"issue":"8","key":"12_CR20","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/JBHI.2020.2980262","volume":"24","author":"J Yoon","year":"2020","unstructured":"Yoon, J., Drumright, L.N., van der Schaar, M.: Anonymization through data synthesis using generative adversarial networks (ads-GAN). IEEE J. Biomed. Health Inform. 24(8), 2378\u20132388 (2020). https:\/\/doi.org\/10.1109\/JBHI.2020.2980262","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"12_CR21","unstructured":"Yoon, J., Jordon, J., van\u00a0der Schaar, M.: PATE-GAN: Generating synthetic data with differential privacy guarantees. In: International Conference on Learning Representations (2019). https:\/\/openreview.net\/forum?id=S1zk9iRqF7"},{"key":"12_CR22","doi-asserted-by":"publisher","unstructured":"Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: PrivBayes: Private data release via bayesian networks. ACM Trans. Database Syst. 42(4) (2017). https:\/\/doi.org\/10.1145\/3134428","DOI":"10.1145\/3134428"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases. Research Track"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06096-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T10:22:37Z","timestamp":1777630957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06096-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,27]]},"ISBN":["9783032060952","9783032060969"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06096-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,27]]},"assertion":[{"value":"27 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ecmlpkdd.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}