{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:55:14Z","timestamp":1770231314599,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819698714","type":"print"},{"value":"9789819698721","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9872-1_10","type":"book-chapter","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T14:35:14Z","timestamp":1753281314000},"page":"117-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MvSMIA: Multi-view Source Membership Inference Attack in Federated Learning"],"prefix":"10.1007","author":[{"given":"Jiaxin","family":"Li","sequence":"first","affiliation":[]},{"given":"Hongyun","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Yuhang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,24]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.specom.2022.11.005","volume":"146","author":"P Singh","year":"2023","unstructured":"Singh, P., Sahidullah, M., Saha, G.: Modulation spectral features for speech emotion recognition using deep neural networks. Speech Commun. 146, 53\u201369 (2023)","journal-title":"Speech Commun."},{"key":"10_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.106822","volume":"181","author":"V Kandasamy","year":"2025","unstructured":"Kandasamy, V., Simic, V., Bacanin, N., Pamucar, D.: Optimized deep learning networks for accurate identification of cancer cells in bone marrow. Neural Netw. 181, 106822 (2025)","journal-title":"Neural Netw."},{"issue":"5","key":"10_CR3","doi-asserted-by":"publisher","first-page":"4443","DOI":"10.1109\/TITS.2023.3329489","volume":"25","author":"H Yang","year":"2024","unstructured":"Yang, H., Yu, W., Zhang, G., et al.: Network-wide traffic flow dynamics prediction leveraging macroscopic traffic flow model and deep neural networks. IEEE Trans. Intell. Transp. Syst. 25(5), 4443\u20134457 (2024)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10_CR4","unstructured":"McMahan, B., Moore, E., Ramage, D., et al.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273\u20131282 (2017)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Zhao, J.C., Sharma, A., Elkordy, A.R., et al.: Loki: Large-scale data reconstruction attack against federated learning through model manipulation. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 1287\u20131305 (2024)","DOI":"10.1109\/SP54263.2024.00030"},{"issue":"4","key":"10_CR6","doi-asserted-by":"publisher","first-page":"3328","DOI":"10.1109\/TDSC.2022.3196646","volume":"20","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Huang, Y., Song, M., et al.: Poisoning-assisted property inference attack against federated learning. IEEE Trans. Depend. Secure Comput. 20(4), 3328\u20133340 (2022)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., et al.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318 (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Bai, G., Chamikara, M.A.P., et al.: AgrEvader: poisoning membership inference against Byzantine-robust federated learning. In: Proceedings of the ACM Web Conference 2023, pp. 2371\u20132382 (2023)","DOI":"10.1145\/3543507.3583542"},{"key":"10_CR9","volume":"67","author":"Y Gu","year":"2022","unstructured":"Gu, Y., Bai, Y., Xu, S.: CS-MIA: membership inference attack based on prediction confidence series in federated learning. J. Inform. Secur. Appl. 67, 103201 (2022)","journal-title":"J. Inform. Secur. Appl."},{"issue":"11s","key":"10_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3523273","volume":"54","author":"H Hu","year":"2022","unstructured":"Hu, H., Salcic, Z., Sun, L., et al.: Membership inference attacks on machine learning: a survey. ACM Comput. Surv. 54(11s), 1\u201337 (2022)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"3012","DOI":"10.1109\/TDSC.2023.3321565","volume":"21","author":"H Hu","year":"2024","unstructured":"Hu, H., Zhang, X., Salcic, Z., et al.: Source inference attacks: beyond membership inference attacks in federated learning. IEEE Trans. Dependable Secure Comput. 21(4), 3012\u20133029 (2024)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, L., Li, L., Li, X., et al.: Efficient membership inference attacks against federated learning via bias differences. In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, pp. 222\u2013235 (2023)","DOI":"10.1145\/3607199.3607204"},{"key":"10_CR13","unstructured":"Li, J., Li, N., Ribeiro, B.: Effective passive membership inference attacks in federated learning against overparameterized models. In: The Eleventh International Conference on Learning Representations (2023)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Melis, L., Song, C., De Cristofaro, E., et al.: Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 691\u2013706 (2019)","DOI":"10.1109\/SP.2019.00029"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"4996","DOI":"10.1109\/TIFS.2023.3303718","volume":"18","author":"G Liu","year":"2023","unstructured":"Liu, G., Tian, Z., Chen, J., et al.: TEAR: exploring temporal evolution of adversarial robustness for membership inference attacks against federated learning. IEEE Trans. Inf. Forensics Secur. 18, 4996\u20135010 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103535","volume":"136","author":"X He","year":"2024","unstructured":"He, X., Xu, Y., Zhang, S., et al.: Enhance membership inference attacks in federated learning. Comput. Secur. 136, 103535 (2024)","journal-title":"Comput. Secur."},{"issue":"4","key":"10_CR17","doi-asserted-by":"publisher","first-page":"4290","DOI":"10.1109\/TDSC.2023.3326230","volume":"21","author":"G Pichler","year":"2023","unstructured":"Pichler, G., Romanelli, M., Vega, L., et al.: Perfectly accurate membership inference by a dishonest central server in federated learning. IEEE Trans. Dependable Secure Comput. 21(4), 4290\u20134296 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10_CR18","unstructured":"Liu, Y., Wen, R., He, X., et al.: ML-Doctor: Holistic risk assessment of inference attacks against machine learning models. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 4525\u20134542 (2022)"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9872-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T06:23:25Z","timestamp":1770186205000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9872-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819698714","9789819698721"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9872-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}