{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T06:54:26Z","timestamp":1765608866514,"version":"3.48.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032137135","type":"print"},{"value":"9783032137142","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-13714-2_5","type":"book-chapter","created":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T06:43:35Z","timestamp":1765608215000},"page":"49-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["NEXUS: Neuron Activation Scores Exploits for\u00a0Unveiling Sensitive Attributes"],"prefix":"10.1007","author":[{"given":"Debasmita","family":"Manna","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,14]]},"reference":[{"key":"5_CR1","unstructured":"Case 3:23-cv-03440-lb document 1 filed 07\/11\/23 page 1 of 90. https:\/\/fingfx.thomsonreuters.com\/gfx\/legaldocs\/myvmodloqvr\/GOOGLE%20AI%20LAWSUIT%20complaint.pdf. Accessed July 2023"},{"key":"5_CR2","unstructured":"Llm02:2025 sensitive information disclosure, https:\/\/genai.owasp.org\/llmrisk\/llm022025-sensitive-information-disclosure\/. Accessed July 2025"},{"key":"5_CR3","unstructured":"Annamalai, M.S.M.S., Gadotti, A., Rocher, L.: A linear reconstruction approach for attribute inference attacks against synthetic data. In: 33rd USENIX Security Symposium (USENIX Security 24), pp. 2351\u20132368 (2024)"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Becker, B., Kohavi, R.: Adult. UCI Machine Learning Repository (1996). https:\/\/doi.org\/10.24432\/C5XW20.","DOI":"10.24432\/C5XW20."},{"key":"5_CR5","unstructured":"Carlini, N., Liu, C., Erlingsson, U., Kos, J., Song, D.X.: The secret sharer: evaluating and testing unintended memorization in neural networks. In: USENIX Security Symposium (2018)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Duddu, V., Boutet, A.: Inferring sensitive attributes from model explanations. In: Proceedings of the 31st ACM International Conference on Information & Knowledge Management, CIKM \u201922, New York, NY, USA, pp. 416\u2013425. Association for Computing Machinery (2022)","DOI":"10.1145\/3511808.3557362"},{"key":"5_CR7","first-page":"09","volume":"2","author":"C Dwork","year":"2010","unstructured":"Dwork, C., Naor, M.: On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. J. Priv. Confident. 2, 09 (2010)","journal-title":"J. Priv. Confident."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS \u201915, New York, NY, USA, pp. 1322\u20131333. Association for Computing Machinery (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"5_CR9","unstructured":"Fredrikson, M., Lantz, E., Jha, S., Lin, S.M., Page, D., Ristenpart, T.: Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing. In: Fu, K., Jung, J. (eds.) Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, 20\u201322 August 2014, pp. 17\u201332. USENIX Association (2014)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Ganju, K., Wang, Q., Yang, W., Gunter, C.A., Borisov, N.: Property inference attacks on fully connected neural networks using permutation invariant representations. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201918, New York, NY, USA, pp. 619\u2013633. Association for Computing Machinery (2018)","DOI":"10.1145\/3243734.3243834"},{"key":"5_CR11","unstructured":"Ghorbani, A., Zou, J.: Neuron shapley: discovering the responsible neurons. In: Proceedings of the 34th International Conference on Neural Information Processing Systems, NIPS \u201920, Red Hook, NY, USA. Curran Associates Inc. (2020)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Jayaraman, B., Evans, D.: Are attribute inference attacks just imputation? In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201922, New York, NY, USA, pp. 1569\u20131582. Association for Computing Machinery (2022)","DOI":"10.1145\/3548606.3560663"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Luo, X., Jiang, Y., Xiao, X.: Feature inference attack on shapley values. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201922, New York, NY, USA, pp. 2233\u20132247. Association for Computing Machinery (2022)","DOI":"10.1145\/3548606.3560573"},{"key":"5_CR14","unstructured":"Mehnaz, S., Dibbo, S.V., Kabir, E., Li, N., Bertino, E.: Are your sensitive attributes private? Novel model inversion attribute inference attacks on classification models. In: USENIX Security Symposium (2022)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Shokri, R., Strobel, M., Zick, Y.: On the privacy risks of model explanations. In: Proceedings of the 2021 AAAI\/ACM Conference on AI, Ethics, and Society, AIES \u201921, New York, NY, USA, pp. 231\u2013241. Association for Computing Machinery (2021)","DOI":"10.1145\/3461702.3462533"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318 (2017)","DOI":"10.1109\/SP.2017.41"},{"issue":"2133","key":"5_CR17","doi-asserted-by":"publisher","first-page":"20180083","DOI":"10.1098\/rsta.2018.0083","volume":"376","author":"M Veale","year":"2018","unstructured":"Veale, M., Binns, R., Edwards, L.: Algorithms that remember: model inversion attacks and data protection law. Phil. Trans. R. Soc. A: Math. Phys. Eng. Sci. 376(2133), 20180083 (2018)","journal-title":"Phil. Trans. R. Soc. A: Math. Phys. Eng. Sci."},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Yang, R., Ma, J., Zhang, J., Kumari, S., Kumar, S., Rodrigues, J.P.C.: Practical feature inference attack in vertical federated learning during prediction in artificial internet of things. IEEE Internet Things J. 11(1), 5\u201316 (2023)","DOI":"10.1109\/JIOT.2023.3275161"},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"Yeh, I.C.: Default of Credit Card Clients. UCI Machine Learning Repository (2009). https:\/\/doi.org\/10.24432\/C55S3H.","DOI":"10.24432\/C55S3H."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-13714-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T06:43:38Z","timestamp":1765608218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-13714-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,14]]},"ISBN":["9783032137135","9783032137142"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-13714-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,14]]},"assertion":[{"value":"14 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Indore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iciss.isrdc.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}