{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:01:36Z","timestamp":1776074496473,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T00:00:00Z","timestamp":1773187200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T00:00:00Z","timestamp":1773187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"DOI":"10.1007\/s10207-026-01230-4","type":"journal-article","created":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:10:23Z","timestamp":1773213023000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protection of the CGAN against membership inference attack using Differential Privacy"],"prefix":"10.1007","volume":"25","author":[{"given":"Ala","family":"Ekramifard","sequence":"first","affiliation":[]},{"given":"Haleh","family":"Amintoosi","sequence":"additional","affiliation":[]},{"given":"Seyed Amin Hosseini","family":"Seno","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,11]]},"reference":[{"key":"1230_CR1","doi-asserted-by":"publisher","first-page":"2104","DOI":"10.22214\/ijraset.2020.6344","volume":"8","author":"P Monil","year":"2020","unstructured":"Monil, P., Darshan, P., Jecky, R., Vimarsh, C., Bhatt, B.R.: Customer segmentation using machine learning. International Journal for Research in Applied Science and Engineering Technology (IJRASET) 8, 2104\u20132108 (2020)","journal-title":"International Journal for Research in Applied Science and Engineering Technology (IJRASET)"},{"key":"1230_CR2","doi-asserted-by":"crossref","unstructured":"Kurth, T., Treichler, S., Romero, J., Mudigonda, M., Luehr, N., Phillips, E., Mahesh, A., Matheson, M., Deslippe, J., Fatica, M., et al.: Exascale deep learning for climate analytics. In SC18: International Conference for High Performance Computing, Networking, Storage and Analysis, 649\u2013660, (2018)","DOI":"10.1109\/SC.2018.00054"},{"key":"1230_CR3","doi-asserted-by":"crossref","unstructured":"Pattnayak, P., Panda A.R.: Innovation on machine learning in healthcare services-an introduction. Technical Advancements of Machine Learning in Healthcare, pages 1\u201330, (2021)","DOI":"10.1007\/978-981-33-4698-7_1"},{"key":"1230_CR4","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In 2017 IEEE symposium on security and privacy (SP), pages 3\u201318, (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"1230_CR5","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Bing, X., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Commun. ACM 63, 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"1230_CR6","unstructured":"Xie, L., Lin, K., Wang, S., Wang, F., Zhou, J.: Differentially private generative adversarial network. arXiv preprint arXiv:1802.06739, (2018)"},{"key":"1230_CR7","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.cose.2019.06.012","volume":"86","author":"Atiye Sadat Hashemi and Saeed Mozaffari","year":"2019","unstructured":"Atiye Sadat Hashemi and Saeed Mozaffari: Secure deep neural networks using adversarial image generation and training with noise-gan. Computers & Security 86, 372\u2013387 (2019)","journal-title":"Computers & Security"},{"issue":"6","key":"1230_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3459992","volume":"54","author":"Z Cai","year":"2021","unstructured":"Cai, Z., Xiong, Z., Honghui, X., Wang, P., Li, W., Pan, Y.: Generative adversarial networks: A survey toward private and secure applications. ACM Computing Surveys (CSUR) 54(6), 1\u201338 (2021)","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"1230_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1049\/cmu2.12507","volume":"17","author":"R Yang","year":"2023","unstructured":"Yang, R., Ma, J., Miao, Y., Ma, X.: Privacy-preserving generative framework for images against membership inference attacks. IET Commun. 17, 45\u201362 (2023)","journal-title":"IET Commun."},{"key":"1230_CR10","doi-asserted-by":"crossref","unstructured":"Nasr, M., Shokri, R., Houmansadr, A.: Machine learning with membership privacy using adversarial regularization. In Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, 634\u2013646, (2018)","DOI":"10.1145\/3243734.3243855"},{"key":"1230_CR11","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics, 1273\u20131282, (2017)"},{"key":"1230_CR12","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1561\/0400000042","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science 9, 211\u2013407 (2014)","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"1230_CR13","doi-asserted-by":"crossref","unstructured":"Han, S., Ding, H., Zhao, S., Ren, S., Zeng, S., Xue, M., Wang, R.: Fed-gan: Federated generative adversarial network with privacy-preserving for cross-device scenarios. IEEE Transactions on Dependable and Secure Computing, (2025)","DOI":"10.1109\/TDSC.2025.3567564"},{"key":"1230_CR14","doi-asserted-by":"crossref","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: Privacy via distributed noise generation. In Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28-June 1, 2006. Proceedings 25, 486\u2013503, (2006)","DOI":"10.1007\/11761679_29"},{"key":"1230_CR15","unstructured":"Zhang, X., Ji, S., Wang, T.: Differentially private releasing via deep generative model (technical report). arXiv preprint arXiv:1801.01594, (2018)"},{"key":"1230_CR16","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/TIFS.2019.2897874","volume":"14","author":"X Chugui","year":"2019","unstructured":"Chugui, X., Ren, J., Zhang, D., Zhang, Y., Qin, Z., Ren, K.: Ganobfuscator: Mitigating information leakage under gan via differential privacy. IEEE Trans. Inf. Forensics Secur. 14, 2358\u20132371 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1230_CR17","doi-asserted-by":"crossref","unstructured":"Torkzadehmahani, R., Kairouz, P., Paten, B.: Dp-cgan: Differentially private synthetic data and label generation. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, 0, (2019)","DOI":"10.1109\/CVPRW.2019.00018"},{"key":"1230_CR18","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCOUTCOMES.118.005122","volume":"12","author":"BK Beaulieu-Jones","year":"2019","unstructured":"Beaulieu-Jones, B.K., Wu, Z.S., Williams, C., Lee, R., Bhavnani, S.P., Byrd, J.B., Greene, C.S.: Privacy-preserving generative deep neural networks support clinical data sharing. Circ. Cardiovasc. Qual. Outcomes 12, e005122 (2019)","journal-title":"Circ. Cardiovasc. Qual. Outcomes"},{"key":"1230_CR19","doi-asserted-by":"crossref","unstructured":"Frigerio, L., Santana de Oliveira, A., Gomez, L., Duverger, P.: Differentially private generative adversarial networks for time series, continuous, and discrete open data. In ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25\u201327, 2019, Proceedings 34, 151\u2013164, (2019)","DOI":"10.1007\/978-3-030-22312-0_11"},{"key":"1230_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102322","volume":"107","author":"C Han","year":"2021","unstructured":"Han, C., Xue, R.: Differentially private gans by adding noise to discriminator\u2019s loss. Computers ans Security 107, 102322 (2021)","journal-title":"Computers ans Security"},{"key":"1230_CR21","doi-asserted-by":"crossref","unstructured":"Ma, C., Li, J., Ding, M., Liu, B., Wei, K., Weng, J., Poor, H.V.: Rdp-gan: A r\u00e9nyi-differential privacy based generative adversarial network. IEEE Transactions on Dependable and Secure Computing, (2023)","DOI":"10.1109\/TDSC.2022.3233580"},{"key":"1230_CR22","doi-asserted-by":"crossref","unstructured":"Azadmanesh, M., Ghahfarokhi, B.S., Talouki, M.A.: Adam-dpgan: a differential private mechanism for generative adversarial network. Applied Intelligence, 1\u201320, (2022)","DOI":"10.1007\/s10489-022-03902-9"},{"key":"1230_CR23","unstructured":"Jordon, J., Yoon, J., Van Der Schaar, M.: Pate-gan: Generating synthetic data with differential privacy guarantees. In International conference on learning representations, (2019)"},{"key":"1230_CR24","first-page":"12673","volume":"33","author":"D Chen","year":"2020","unstructured":"Chen, D., Orekondy, T., Fritz, M.: Gs-wgan: A gradient-sanitized approach for learning differentially private generators. Adv. Neural. Inf. Process. Syst. 33, 12673\u201312684 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1230_CR25","unstructured":"Salem, A., Zhang, Y., Humbert, M., Berrang, P., Fritz, M., Backes, M.: Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246, 2018"},{"key":"1230_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2021.103977","volume":"125","author":"Z Zhang","year":"2022","unstructured":"Zhang, Z., Yan, C., Malin, B.A.: Membership inference attacks against synthetic health data. J. Biomed. Inform. 125, 103977 (2022)","journal-title":"J. Biomed. Inform."},{"key":"1230_CR27","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., Goodfellow, I., McMahan, H. B., Mironov, I., Talwar, K., Zhang, L.: Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pages 308\u2013318, (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"1230_CR28","doi-asserted-by":"crossref","unstructured":"Dwork, C., Rothblum, G.N., Vadhan, S.: Boosting and differential privacy. In 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pages 51\u201360, (2010)","DOI":"10.1109\/FOCS.2010.12"},{"key":"1230_CR29","doi-asserted-by":"crossref","unstructured":"Mironov, I.: R\u00e9nyi differential privacy. In 2017 IEEE 30th computer security foundations symposium (CSF), pages 263\u2013275, (2017)","DOI":"10.1109\/CSF.2017.11"},{"key":"1230_CR30","unstructured":"Papernot, N., Abadi, M., Erlingsson, U., Goodfellow, I., Talwar, K.: Semi-supervised knowledge transfer for deep learning from private training data. In International Conference on Learning Representations (ICLR), pages 1\u201316, (2017)"},{"key":"1230_CR31","doi-asserted-by":"publisher","first-page":"3052","DOI":"10.3390\/s24103052","volume":"24","author":"L Lange","year":"2024","unstructured":"Lange, L., Wenzlitschke, N., Rahm, E.: Generating synthetic health sensor data for privacy-preserving wearable stress detection. Sensors 24, 3052 (2024)","journal-title":"Sensors"},{"key":"1230_CR32","doi-asserted-by":"crossref","unstructured":"Chen, D., Oestreich, M., Afonja, T., Kerkouche, R., Becker, M., Fritz, M.: Towards biologically plausible and private gene expression data generation. In Proceedings on Privacy Enhancing Technologies (PoPETs), (2024)","DOI":"10.56553\/popets-2024-0062"},{"key":"1230_CR33","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research 15, 1929\u20131958 (2014)","journal-title":"The journal of machine learning research"},{"key":"1230_CR34","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. In International conference on machine learning, 214\u2013223, (2017)"},{"key":"1230_CR35","unstructured":"Ioffe, S.: Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167, (2015)"},{"key":"1230_CR36","first-page":"43","volume":"17","author":"A Ekramifard","year":"2025","unstructured":"Ekramifard, A., Amintoosi, H., Seno, S.A.H.: Detection of membership inference attacks on gan models. The ISC International Journal of Information Security 17, 43\u201357 (2025)","journal-title":"The ISC International Journal of Information Security"},{"key":"1230_CR37","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: Gans trained by a two time-scale update rule converge to a local nash equilibrium. Advances in neural information processing systems, 30, (2017)"},{"key":"1230_CR38","doi-asserted-by":"crossref","unstructured":"Hayes, J., Melis, L., Danezis, G., De Cristofaro, E.: Logan: Membership inference attacks against generative models. arXiv preprint arXiv:1705.07663, (2017)","DOI":"10.2478\/popets-2019-0008"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-026-01230-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-026-01230-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-026-01230-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:22:38Z","timestamp":1776072158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-026-01230-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,11]]},"references-count":38,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["1230"],"URL":"https:\/\/doi.org\/10.1007\/s10207-026-01230-4","relation":{},"ISSN":["1615-5270"],"issn-type":[{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,11]]},"assertion":[{"value":"23 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"67"}}