{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:17:16Z","timestamp":1743124636985,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615476"},{"type":"electronic","value":"9789819615483"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1548-3_4","type":"book-chapter","created":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T09:16:02Z","timestamp":1739697362000},"page":"41-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DP-CLMI:Differentially Private Contrastive Learning Against Membership Inference Attack"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2805-2817","authenticated-orcid":false,"given":"Junying","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4714-492X","authenticated-orcid":false,"given":"Yiwen","family":"Xia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0764-3741","authenticated-orcid":false,"given":"Xindi","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0894-4992","authenticated-orcid":false,"given":"Qi","family":"Jiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0690-5321","authenticated-orcid":false,"given":"Ning","family":"Xi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9923-6405","authenticated-orcid":false,"given":"Di","family":"Lu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8207-1472","authenticated-orcid":false,"given":"Pengbin","family":"Feng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8118-411X","authenticated-orcid":false,"given":"Sheng","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4251-1143","authenticated-orcid":false,"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"4_CR1","first-page":"857","volume":"35","author":"X Liu","year":"2021","unstructured":"Liu, X., et al.: Self-supervised learning: generative or contrastive. IEEE Trans. Knowl. Data Eng. 35, 857\u2013876 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"4_CR2","unstructured":"Gutmann, M., Hyv\u00e4rinen, A.: Noise-contrastive estimation: a new estimation principle for unnormalized statistical models. In: Proceedings of the 13th International Conference on Artificial Intelligence and Statistics, AISTATS, vol.\u00a09, pp. 297\u2013304 (2010)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"He, K., Fan, H., Wu, Y., Xie, S., Girshick, R.B.: Momentum contrast for unsupervised visual representation learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR, pp. 9726\u20139735 (2020)","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"4_CR4","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.E.: A simple framework for contrastive learning of visual representations. In: Proceedings of the 37th International Conference on Machine Learning, ICML, vol.\u00a0119, pp. 1597\u20131607 (2020)"},{"key":"4_CR5","first-page":"21271","volume":"33","author":"JB Grill","year":"2020","unstructured":"Grill, J.B., et al.: Bootstrap your own latent-a new approach to self-supervised learning. Adv. Neural. Inf. Process. Syst. 33, 21271\u201321284 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"4_CR6","unstructured":"Zbontar, J., Jing, L., Misra, I., LeCun, Y., Deny, S.: Barlow twins: self-supervised learning via redundancy reduction. In: Proceedings of the International Conference on Machine Learning, pp. 12310\u201312320 (2021)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Liu, H., Jia, J., Qu, W., Gong, N.Z.: Encodermi: membership inference against pre-trained encoders in contrastive learning. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 2081\u20132095 (2021)","DOI":"10.1145\/3460120.3484749"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"He, X., Zhang, Y.: Quantifying and mitigating privacy risks of contrastive learning. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, CCS, pp. 845\u2013863 (2021)","DOI":"10.1145\/3460120.3484571"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Wang, Z., Mi, B., Chen, K.: Member inference attacks in federated contrastive learning. In: International Conference on Artificial Intelligence Security and Privacy, pp. 42\u201352 (2023)","DOI":"10.1007\/978-981-99-9785-5_4"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Chen, D., Liu, X., Cui, J., Zhong, H.: Poster: membership inference attacks via contrastive learning. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 3555\u20133557 (2023)","DOI":"10.1145\/3576915.3624384"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: Proceedings of the International Colloquium on Automata, Languages, and Programming, pp. 1\u201312 (2006)","DOI":"10.1007\/11787006_1"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"issue":"11","key":"4_CR13","doi-asserted-by":"publisher","first-page":"9701","DOI":"10.1002\/int.23002","volume":"37","author":"W Li","year":"2022","unstructured":"Li, W., et al.: DPCL: contrastive representation learning with differential privacy. Int. J. Intell. Syst. 37(11), 9701\u20139725 (2022)","journal-title":"Int. J. Intell. Syst."},{"key":"4_CR14","first-page":"27131","volume":"34","author":"B Ghazi","year":"2021","unstructured":"Ghazi, B., Golowich, N., Kumar, R., Manurangsi, P., Zhang, C.: Deep learning with label differential privacy. Adv. Neural. Inf. Process. Syst. 34, 27131\u201327145 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Chen, X., He, K.: Exploring simple Siamese representation learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15750\u201315758 (2021)","DOI":"10.1109\/CVPR46437.2021.01549"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Chen, X., Xie, S., He, K.: An empirical study of training self-supervised vision transformers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 9640\u20139649 (2021)","DOI":"10.1109\/ICCV48922.2021.00950"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Caron, M., et al.: Emerging properties in self-supervised vision transformers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 9650\u20139660 (2021)","DOI":"10.1109\/ICCV48922.2021.00951"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A., et\u00a0al.: The algorithmic foundations of differential privacy. In: Proceedings of the Foundations and Trends\u00ae in Theoretical Computer Science, vol. 9, pp. 211\u2013407 (2014)","DOI":"10.1561\/0400000042"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Phan, N., Wu, X., Hu, H., Dou, D.: Adaptive Laplace mechanism: differential privacy preservation in deep learning. In: 2017 IEEE International Conference on Data Mining (ICDM), pp. 385\u2013394 (2017)","DOI":"10.1109\/ICDM.2017.48"},{"key":"4_CR20","unstructured":"Jordon, J., Yoon, J., Van Der\u00a0Schaar, M.: PATE-GAN: generating synthetic data with differential privacy guarantees. In: International Conference on Learning Representations (2018)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Lecuyer, M., Atlidakis, V., Geambasu, R., Hsu, D., Jana, S.: Certified robustness to adversarial examples with differential privacy. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 656\u2013672 (2019)","DOI":"10.1109\/SP.2019.00044"},{"key":"4_CR22","doi-asserted-by":"publisher","first-page":"2816","DOI":"10.1109\/TIFS.2018.2831619","volume":"13","author":"K Kalantari","year":"2018","unstructured":"Kalantari, K., Sankar, L., Sarwate, A.D.: Robust privacy-utility tradeoffs under differential privacy and hamming distortion. IEEE Trans. Inf. Forensics Secur. 13, 2816\u20132830 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR23","unstructured":"Geng, Q., Ding, W., Guo, R., Kumar, S.: Tight analysis of privacy and utility tradeoff in approximate differential privacy. In: Proceedings of the International Conference on Artificial Intelligence and Statistics, pp. 89\u201399 (2020)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Xu, Z., Shi, S., Liu, A.X., Zhao, J., Chen, L.: An adaptive and fast convergent approach to differentially private deep learning. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pp. 1867\u20131876 (2020)","DOI":"10.1109\/INFOCOM41043.2020.9155359"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Hadsell, R., Chopra, S., LeCun, Y.: Dimensionality reduction by learning an invariant mapping. In: Proceedings of the Computer Society Conference on Computer Vision and Pattern Recognition, CVPR, pp. 1735\u20131742 (2006)","DOI":"10.1109\/CVPR.2006.100"},{"key":"4_CR26","unstructured":"Zhu, Y., Wang, Y.: Poission subsampled R\u00e9nyi differential privacy. In: Proceedings of the 36th International Conference on Machine Learning, ICML, pp. 7634\u20137642 (2019)"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Mironov, I.: R\u00e9nyi differential privacy. In: Proceedings of the 30th Computer Security Foundations Symposium, CSF, pp. 263\u2013275 (2017)","DOI":"10.1109\/CSF.2017.11"},{"issue":"11s","key":"4_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3523273","volume":"54","author":"H Hu","year":"2022","unstructured":"Hu, H., Salcic, Z., Sun, L., Dobbie, G., Yu, P.S., Zhang, X.: Membership inference attacks on machine learning: a survey. ACM Comput. Surv. (CSUR) 54(11s), 1\u201337 (2022)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"4_CR29","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. Adv. Neural Inf. Process. Syst. 32 (2019)"},{"key":"4_CR30","unstructured":"Choquette-Choo, C.A., Tram\u00e8r, F., Carlini, N., Papernot, N.: Label-only membership inference attacks. In: Proceedings of the 38th International Conference on Machine Learning, ICML, pp. 1964\u20131974 (2021)"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Salem, A., Zhang, Y., Humbert, M., Berrang, P., Fritz, M., Backes, M.: ML-leaks: model and data independent membership inference attacks and defenses on machine learning models. In: Proceedings of the 26th Annual Network and Distributed System Security Symposium, NDSS, pp. 1597\u20131607 (2019)","DOI":"10.14722\/ndss.2019.23119"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: Proceedings of the IEEE Symposium on Security and Privacy, SP, pp. 3\u201318 (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"4_CR33","unstructured":"Yousefpour, A., et\u00a0al.: Opacus: user-friendly differential privacy library in PyTorch. arXiv preprint arXiv:2109.12298 (2021)"},{"key":"4_CR34","unstructured":"Wang, Y.X., Balle, B., Kasiviswanathan, S.P.: Subsampled R\u00e9nyi differential privacy and analytical moments accountant. In: Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, pp. 1226\u20131235 (2019)"},{"key":"4_CR35","unstructured":"Koskela, A., Honkela, A.: Learning rate adaptation for differentially private stochastic gradient descent. arXiv preprint arXiv:1809.03832 (2018)"},{"key":"4_CR36","unstructured":"Krizhevsky, A.: CIFAR-100 Dataset. https:\/\/www.cs.toronto.edu\/~kriz\/cifar.html. Accessed 28 Apr 2023"},{"key":"4_CR37","unstructured":"Coates, A., Ng, A., Lee, H.: An analysis of single-layer networks in unsupervised feature learning. In: Proceedings of the 14th International Conference on Artificial Intelligence and Statistics, pp. 215\u2013223 (2011)"},{"key":"4_CR38","unstructured":"Song, L., Mittal, P.: Systematic evaluation of privacy risks of machine learning models. In: Proceedings of the 30th USENIX Security Symposium, USENIX Security, pp. 2615\u20132632 (2021)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1548-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T09:16:36Z","timestamp":1739697396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1548-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615476","9789819615483"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1548-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}