{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T06:18:14Z","timestamp":1762409894655,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032104885","type":"print"},{"value":"9783032104892","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T00:00:00Z","timestamp":1762473600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T00:00:00Z","timestamp":1762473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10489-2_28","type":"book-chapter","created":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T06:03:36Z","timestamp":1762409016000},"page":"331-342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Preliminary Analysis of\u00a0Loss Functions in\u00a0Generative Model Inversion Attacks"],"prefix":"10.1007","author":[{"given":"F.","family":"Moreno","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1062-3127","authenticated-orcid":false,"given":"A.","family":"Rivera","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7891-3059","authenticated-orcid":false,"given":"M. J.","family":"del Jesus","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6670-564X","authenticated-orcid":false,"given":"M. D.","family":"P\u00e9rez-Godoy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,7]]},"reference":[{"key":"28_CR1","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1049\/cit2.12028","volume":"6","author":"A Chakraborty","year":"2021","unstructured":"Chakraborty, A., et al.: A survey on adversarial attacks and defences. CAAI Trans. Intell. Technol. 6, 25\u201345 (2021)","journal-title":"CAAI Trans. Intell. Technol."},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Chen, S., et\u00a0al.: Knowledge-enriched distributional model inversion attacks. In: IEEE\/CVF International Conference on Computer Vision, pp. 16178\u201316187 (2021)","DOI":"10.1109\/ICCV48922.2021.01587"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Dibbo, S.V.: SoK: model inversion attack landscape: taxonomy, challenges, and future roadmap. In: 2023 IEEE 36th Computer Security Foundations Symposium, pp. 439\u2013456 (2023)","DOI":"10.1109\/CSF57540.2023.00027"},{"key":"28_CR4","unstructured":"Fang, H., et\u00a0al.: Privacy leakage on DNNs: a survey of model inversion attacks and defenses. ArXiv abs\/2402.04013 (2024)"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"He, K., et\u00a0al.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"28_CR6","unstructured":"Heusel, M., et\u00a0al.: GANs trained by a two time-scale update rule converge to a local nash equilibrium. In: Neural Information Processing Systems, vol. 30 (2017)"},{"key":"28_CR7","unstructured":"Huang, G.B., et\u00a0al.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. In: Faces in \u2018Real-Life\u2019 Images: Detection, Alignment, and Recognition (2008)"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Karras, T., et\u00a0al.: A style-based generator architecture for generative adversarial networks. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4396\u20134405 (2018)","DOI":"10.1109\/CVPR.2019.00453"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Li, M., et\u00a0al.: Towards transferable targeted attack. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 641\u2013649 (2020)","DOI":"10.1109\/CVPR42600.2020.00072"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Liu, Z., et\u00a0al.: Deep learning face attributes in the wild. In: IEEE International Conference on Computer Vision, pp. 3730\u20133738 (2015)","DOI":"10.1109\/ICCV.2015.425"},{"key":"28_CR11","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/s13635-024-00158-3","volume":"2024","author":"A Paracha","year":"2024","unstructured":"Paracha, A., et al.: Machine learning security and privacy: a review of threats and countermeasures. EURASIP J. Inf. Secur. 2024, 10 (2024)","journal-title":"EURASIP J. Inf. Secur."},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Parkhi, O., et\u00a0al.: Deep face recognition. In: British Machine Vision Conference, pp. 1\u201312 (2015)","DOI":"10.5244\/C.29.41"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Qiu, Y., et\u00a0al.: A closer look at GAN priors: exploiting intermediate features for enhanced model inversion attacks. In: European Conference on Computer Vision, pp. 109\u2013126 (2024)","DOI":"10.1007\/978-3-031-73411-3_7"},{"key":"28_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104074","volume":"148","author":"Y Roumani","year":"2024","unstructured":"Roumani, Y., et al.: Examining the factors that impact the severity of cyberattacks on critical infrastructures. Comput. Secur. 148, 104074 (2024)","journal-title":"Comput. Secur."},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Sengupta, S., et\u00a0al.: Frontal to profile face verification in the wild. In: 2016 IEEE Winter Conference on Applications of Computer Vision, pp.\u00a01\u20139 (2016)","DOI":"10.1109\/WACV.2016.7477558"},{"key":"28_CR16","unstructured":"Struppek, L., et\u00a0al.: Plug & play attacks: towards robust and flexible model inversion attacks. ArXiv abs\/2201.12179 (2022)"},{"key":"28_CR17","unstructured":"Wang, K.C., et\u00a0al.: Variational model inversion attacks. ArXiv abs\/2201.10787 (2022)"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Yuan, X., et\u00a0al.: Pseudo label-guided model inversion attack via conditional generative adversarial network. In: AAAI Conference on Artificial Intelligence, vol. 37, no. 3, pp. 3349\u20133357 (2023)","DOI":"10.1609\/aaai.v37i3.25442"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et\u00a0al.: The secret revealer: generative model-inversion attacks against deep neural networks. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 253\u2013261 (2020)","DOI":"10.1109\/CVPR42600.2020.00033"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10489-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T06:03:55Z","timestamp":1762409035000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10489-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,7]]},"ISBN":["9783032104885","9783032104892"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10489-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,7]]},"assertion":[{"value":"7 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDEAL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Data Engineering and Automated Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ja\u00e9n","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ideal2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ideal2025.ujaen.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}