{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:23:31Z","timestamp":1766067811790,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":44,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819973552"},{"type":"electronic","value":"9789819973569"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-7356-9_28","type":"book-chapter","created":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T09:03:24Z","timestamp":1697706204000},"page":"467-484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Black-Box Fairness Testing with\u00a0Shadow Models"],"prefix":"10.1007","author":[{"given":"Weipeng","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Chao","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Chenhao","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Jingyi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xuanqi","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,20]]},"reference":[{"unstructured":"Code of black-box fairness testing with shadow models. https:\/\/github.com\/lenijwp\/Black-box-Discrimination-Finder","key":"28_CR1"},{"unstructured":"Embedding api-build faster great ai algorithms for hr. https:\/\/hrflow.ai\/embedding\/","key":"28_CR2"},{"doi-asserted-by":"crossref","unstructured":"Aggarwal, A., Lohia, P., Nagar, S., Dey, K., Saha, D.: Black box fairness testing of machine learning models. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 625\u2013635 (2019)","key":"28_CR3","DOI":"10.1145\/3338906.3338937"},{"unstructured":"Angwin, J., Larson, J., Mattu, S., Kirchner, L.: Machine bias. ProPublica, 23 May 2016","key":"28_CR4"},{"unstructured":"Batina, L., Bhasin, S., Jap, D., Picek, S.: CSI NN: reverse engineering of neural network architectures through electromagnetic side channel. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 515\u2013532. USENIX Association, Santa Clara, CA, August 2019. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/batina","key":"28_CR5"},{"unstructured":"Bojarski, M., et al.: End to end learning for self-driving cars. arXiv preprint arXiv:1604.07316 (2016)","key":"28_CR6"},{"issue":"2","key":"28_CR7","first-page":"68","volume":"5","author":"V Cherian","year":"2017","unstructured":"Cherian, V., Bindu, M.: Heart disease prediction using Naive Bayes algorithm and laplace smoothing technique. Int. J. Comput. Sci. Trends Technol. 5(2), 68\u201373 (2017)","journal-title":"Int. J. Comput. Sci. Trends Technol."},{"unstructured":"Chollet, F., et al.: Keras (2015). https:\/\/github.com\/keras-team\/keras","key":"28_CR8"},{"unstructured":"Corbett-Davies, S., Goel, S.: The measure and mismeasure of fairness: a critical review of fair machine learning. arXiv preprint arXiv:1808.00023 (2018)","key":"28_CR9"},{"unstructured":"Dua, D., Graff, C.: UCI adult data set (2017). https:\/\/archive.ics.uci.edu\/ml\/datasets\/adult","key":"28_CR10"},{"unstructured":"Dua, D., Graff, C.: UCI bank marketing data set (2017). https:\/\/archive.ics.uci.edu\/ml\/datasets\/bank+marketing","key":"28_CR11"},{"unstructured":"Dua, D., Graff, C.: UCI machine learning repository (2017). https:\/\/archive.ics.uci.edu\/ml","key":"28_CR12"},{"unstructured":"Dua, D., Graff, C.: UCI statlog (german credit data) data set (2017). https:\/\/archive.ics.uci.edu\/ml\/datasets\/statlog+(german+credit+data)","key":"28_CR13"},{"doi-asserted-by":"crossref","unstructured":"Dwork, C., Hardt, M., Pitassi, T., Reingold, O., Zemel, R.: Fairness through awareness. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pp. 214\u2013226 (2012)","key":"28_CR14","DOI":"10.1145\/2090236.2090255"},{"doi-asserted-by":"crossref","unstructured":"Fan, M., Wei, W., Jin, W., Yang, Z., Liu, T.: Explanation-guided fairness testing through genetic algorithm. In: Proceedings of the 44th International Conference on Software Engineering, pp. 871\u2013882 (2022)","key":"28_CR15","DOI":"10.1145\/3510003.3510137"},{"doi-asserted-by":"crossref","unstructured":"Feldman, M., Friedler, S.A., Moeller, J., Scheidegger, C., Venkatasubramanian, S.: Certifying and removing disparate impact. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 259\u2013268 (2015)","key":"28_CR16","DOI":"10.1145\/2783258.2783311"},{"unstructured":"Ferral, K.: Wisconsin supreme court allows state to continue using computer program to assist in sentencing. the capital times, 13 July 2016","key":"28_CR17"},{"doi-asserted-by":"crossref","unstructured":"Galhotra, S., Brun, Y., Meliou, A.: Fairness testing: testing software for discrimination. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pp. 498\u2013510 (2017)","key":"28_CR18","DOI":"10.1145\/3106237.3106277"},{"unstructured":"Goh, G., Cotter, A., Gupta, M., Friedlander, M.P.: Satisfying real-world goals with dataset constraints. In: Advances in Neural Information Processing Systems, pp. 2415\u20132423 (2016)","key":"28_CR19"},{"unstructured":"HLEG, A.: High-level expert group on artificial intelligence. Ethics Guidelines for Trustworthy AI (2019)","key":"28_CR20"},{"key":"28_CR21","doi-asserted-by":"publisher","first-page":"28291","DOI":"10.1109\/ACCESS.2019.2900462","volume":"7","author":"G Huang","year":"2019","unstructured":"Huang, G., Li, Y., Wang, Q., Ren, J., Cheng, Y., Zhao, X.: Automatic classification method for software vulnerability based on deep neural network. IEEE Access 7, 28291\u201328298 (2019)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Kamiran, F., Calders, T., Pechenizkiy, M.: Discrimination aware decision tree learning. In: 2010 IEEE International Conference on Data Mining, pp. 869\u2013874. IEEE (2010)","key":"28_CR22","DOI":"10.1109\/ICDM.2010.50"},{"key":"28_CR23","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-33486-3_3","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"T Kamishima","year":"2012","unstructured":"Kamishima, T., Akaho, S., Asoh, H., Sakuma, J.: Fairness-aware classifier with prejudice remover regularizer. In: Flach, P.A., De Bie, T., Cristianini, N. (eds.) ECML PKDD 2012. LNCS (LNAI), vol. 7524, pp. 35\u201350. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33486-3_3"},{"doi-asserted-by":"crossref","unstructured":"Liang, L., Zheng, K., Sheng, Q., Huang, X.: A denial of service attack method for an IoT system. In: 2016 8th International Conference on Information Technology in Medicine and Education (ITME), pp. 360\u2013364. IEEE (2016)","key":"28_CR24","DOI":"10.1109\/ITME.2016.0087"},{"issue":"2","key":"28_CR25","first-page":"129","volume":"28","author":"SP Lloyd","year":"1982","unstructured":"Lloyd, S.P.: Least squares quantization in PCM. IEEE Trans. 28(2), 129\u2013137 (1982)","journal-title":"IEEE Trans."},{"doi-asserted-by":"crossref","unstructured":"Oh, S.J., Augustin, M., Schiele, B., Fritz, M.: Towards reverse-engineering black-box neural networks (2018)","key":"28_CR26","DOI":"10.1007\/978-3-030-28954-6_7"},{"unstructured":"Olson, P.: The algorithm that beats your bank manager. CNN money, 15 March 2011","key":"28_CR27"},{"doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 506\u2013519 (2017)","key":"28_CR28","DOI":"10.1145\/3052973.3053009"},{"doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: Why should i trust you? Explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144 (2016)","key":"28_CR29","DOI":"10.1145\/2939672.2939778"},{"doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Wu, T., Guestrin, C., Singh, S.: Beyond accuracy: behavioral testing of NLP models with checklist. arXiv preprint arXiv:2005.04118 (2020)","key":"28_CR30","DOI":"10.24963\/ijcai.2021\/659"},{"doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815\u2013823 (2015)","key":"28_CR31","DOI":"10.1109\/CVPR.2015.7298682"},{"doi-asserted-by":"crossref","unstructured":"Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spafford, E.H., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on TCP. In: Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097), pp. 208\u2013223. IEEE (1997)","key":"28_CR32","DOI":"10.1109\/SECPRI.1997.601338"},{"issue":"3","key":"28_CR33","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/2460276.2460278","volume":"11","author":"L Sweeney","year":"2013","unstructured":"Sweeney, L.: Discrimination in online ad delivery. Queue 11(3), 10\u201329 (2013)","journal-title":"Queue"},{"unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)","key":"28_CR34"},{"doi-asserted-by":"crossref","unstructured":"Tramer, F., et al.: Fairtest: discovering unwarranted associations in data-driven applications. In: 2017 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 401\u2013416. IEEE (2017)","key":"28_CR35","DOI":"10.1109\/EuroSP.2017.29"},{"unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: 25th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 16), pp. 601\u2013618 (2016)","key":"28_CR36"},{"doi-asserted-by":"crossref","unstructured":"Udeshi, S., Arora, P., Chattopadhyay, S.: Automated directed fairness testing. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 98\u2013108 (2018)","key":"28_CR37","DOI":"10.1145\/3238147.3238165"},{"doi-asserted-by":"crossref","unstructured":"Wang, B., Gong, N.Z.: Stealing hyperparameters in machine learning. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 36\u201352. IEEE (2018)","key":"28_CR38","DOI":"10.1109\/SP.2018.00038"},{"doi-asserted-by":"crossref","unstructured":"Yu, H., et al.: Cloudleak: large-scale deep learning models stealing through adversarial examples. In: Proceedings of Network and Distributed Systems Security Symposium (NDSS) (2020)","key":"28_CR39","DOI":"10.14722\/ndss.2020.24178"},{"doi-asserted-by":"crossref","unstructured":"Zhang, B.H., Lemoine, B., Mitchell, M.: Mitigating unwanted biases with adversarial learning. In: Proceedings of the 2018 AAAI\/ACM Conference on AI, Ethics, and Society, pp. 335\u2013340 (2018)","key":"28_CR40","DOI":"10.1145\/3278721.3278779"},{"doi-asserted-by":"crossref","unstructured":"Zhang, L., Zhang, Y., Zhang, M.: Efficient white-box fairness testing through gradient search. In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 103\u2013114 (2021)","key":"28_CR41","DOI":"10.1145\/3460319.3464820"},{"doi-asserted-by":"crossref","unstructured":"Zhang, L., Wu, Y., Wu, X.: Achieving non-discrimination in data release. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1335\u20131344 (2017)","key":"28_CR42","DOI":"10.1145\/3097983.3098167"},{"doi-asserted-by":"crossref","unstructured":"Zhang, P., et al.: White-box fairness testing through adversarial sampling. In: 42nd International Conference on Software Engineering (2020)","key":"28_CR43","DOI":"10.1145\/3377811.3380331"},{"doi-asserted-by":"crossref","unstructured":"Zhang, P., et al.: White-box fairness testing through adversarial sampling (2020). https:\/\/github.com\/pxzhang94\/ADF","key":"28_CR44","DOI":"10.1145\/3377811.3380331"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-7356-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T09:09:28Z","timestamp":1697706568000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-7356-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819973552","9789819973569"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-7356-9_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"20 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icics23.nankai.edu.cn\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"181","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.33","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.93","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}