{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:08Z","timestamp":1740122648807,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"17-18","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100018910","name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China","doi-asserted-by":"publisher","award":["2020A065"],"award-info":[{"award-number":["2020A065"]}],"id":[{"id":"10.13039\/100018910","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s10489-024-05495-x","type":"journal-article","created":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T05:01:51Z","timestamp":1718773311000},"page":"7994-8019","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["HAMIATCM: high-availability membership inference attack against text classification models under little knowledge"],"prefix":"10.1007","volume":"54","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7210-0780","authenticated-orcid":false,"given":"Yao","family":"Cheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7729-5439","authenticated-orcid":false,"given":"Senlin","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8850-8380","authenticated-orcid":false,"given":"Limin","family":"Pan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0472-5019","authenticated-orcid":false,"given":"Yunwei","family":"Wan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0331-3120","authenticated-orcid":false,"given":"Xinshuai","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,19]]},"reference":[{"issue":"11s","key":"5495_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3523273","volume":"54","author":"H Hu","year":"2022","unstructured":"Hu H, Salcic Z, Sun L et al (2022) Membership inference attacks on machine learning: a survey. ACM Comput Surv (CSUR) 54(11s):1\u201337","journal-title":"ACM Comput Surv (CSUR)"},{"key":"5495_CR2","unstructured":"Vakili T (2023) Attacking and defending the privacy of clinical language models[D]. Department of Computer and Systems Sciences, Stockholm University"},{"key":"5495_CR3","unstructured":"Vakili T, Dalianis H (2021) Are clinical BERT models privacy preserving? The difficulty of extracting patient-condition associations[C]. Proceedings of the AAAI 2021 Fall Symposium on Human Partnership with Medical AI: Design, Operationalization, and Ethics"},{"key":"5495_CR4","doi-asserted-by":"crossref","unstructured":"Zhang M, Ren Z, Wang Z et al (2021) Membership inference attacks against recommender systems[C]. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 864\u2013879","DOI":"10.1145\/3460120.3484770"},{"issue":"2","key":"5495_CR5","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1109\/TDSC.2022.3154029","volume":"20","author":"G Zhang","year":"2022","unstructured":"Zhang G, Liu B, Zhu T et al (2022) Label-only membership inference attacks and defenses in semantic segmentation models. IEEE Trans Dependable Secur Comput 20(2):1435\u20131449","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"5495_CR6","unstructured":"Shejwalkar V, Inan HA, Houmansadr A et al (2021) Membership inference attacks against nlp classification models[C]. NeurIPS 2021 Workshop Privacy in Machine Learning"},{"key":"5495_CR7","doi-asserted-by":"crossref","unstructured":"Wang Y, Xu N, Huang S et al (2022) Analyzing and defending against membership inference attacks in natural language processing classification[C]. 2022 IEEE International Conference on Big Data (Big Data). IEEE, 5823\u20135832","DOI":"10.1109\/BigData55660.2022.10020711"},{"key":"5495_CR8","doi-asserted-by":"crossref","unstructured":"Song C, Raghunathan A (2020) Information leakage in embedding models[C]. Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, 377\u2013390","DOI":"10.1145\/3372297.3417270"},{"key":"5495_CR9","doi-asserted-by":"crossref","unstructured":"Justus Mattern F, Mireshghallah Z, Jin et al (2023) Membership inference attacks against language models via neighbourhood comparison[C]. In: Findings of the Association for Computational Linguistics: ACL 2023, pp 11330\u201311343","DOI":"10.18653\/v1\/2023.findings-acl.719"},{"key":"5495_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1162\/tacl_a_00299","volume":"8","author":"S Hisamoto","year":"2020","unstructured":"Hisamoto S, Post M, Duh K (2020) Membership inference attacks on sequence-to-sequence models: is my data in your machine translation system?[J]. Trans Association Comput Linguistics 8:49\u201363","journal-title":"Trans Association Comput Linguistics"},{"key":"5495_CR11","unstructured":"Carlini N, Tramer F, Wallace E et al (2021) Extracting training data from large language models[C]. 30th USENIX Security Symposium (USENIX Security 21), 2633\u20132650"},{"key":"5495_CR12","unstructured":"Kandpal N, Wallace E, Raffel C (2022) Deduplicating training data mitigates privacy risks in language models[C]. International Conference on Machine Learning. PMLR, 10697\u201310707"},{"key":"5495_CR13","doi-asserted-by":"crossref","unstructured":"Song C, Shmatikov V (2019) Auditing data provenance in text-generation models[C]. Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 196\u2013206","DOI":"10.1145\/3292500.3330885"},{"key":"5495_CR14","doi-asserted-by":"crossref","unstructured":"Chen D, Yu N, Zhang Y et al (2020) Gan-leaks: A taxonomy of membership inference attacks against generative models[C]. Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, 343\u2013362","DOI":"10.1145\/3372297.3417238"},{"key":"5495_CR15","unstructured":"Yuan X, Zhang L (2022) Membership inference attacks and defenses in neural network pruning[C]. 31st USENIX Security Symposium, 4561\u20134578"},{"key":"5495_CR16","doi-asserted-by":"crossref","unstructured":"Shokri R, Stronati M, Song C et al (2017) Membership inference attacks against machine learning models[C]. 2017 IEEE symposium on security and privacy (SP). IEEE, 3\u201318","DOI":"10.1109\/SP.2017.41"},{"key":"5495_CR17","doi-asserted-by":"crossref","unstructured":"Salem A, Zhang Y, Humbert M et al (2019) ML-Leaks: Model and data independent membership inference attacks and defenses on machine learning models[C]. Network and Distributed Systems Security (NDSS) Symposium","DOI":"10.14722\/ndss.2019.23119"},{"key":"5495_CR18","unstructured":"Mahloujifar S, Inan HA, Chase M et al (2021) Membership Inference on Word Embedding and Beyond[J]. arXiv e-prints. arXiv, p 210611384"},{"key":"5495_CR19","doi-asserted-by":"publisher","first-page":"10207","DOI":"10.1109\/ACCESS.2023.3239668","volume":"11","author":"MG Oh","year":"2023","unstructured":"Oh MG, Park LH, Kim J et al (2023) Membership inference attacks with token-level deduplication on Korean Language Models. IEEE Access 11:10207\u201310217","journal-title":"IEEE Access"},{"key":"5495_CR20","doi-asserted-by":"publisher","first-page":"103571","DOI":"10.1016\/j.cose.2023.103571","volume":"136","author":"S Chen","year":"2024","unstructured":"Chen S, Wang W, Zhong Y et al (2024) HP-MIA: a novel membership inference attack scheme for high membership prediction precision. Computers Secur 136:103571","journal-title":"Computers Secur"},{"key":"5495_CR21","doi-asserted-by":"crossref","unstructured":"Zhang M, Yu N, Wen R et al (2024) Generated distributions are all you need for membership inference attacks against generative models[C]. Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, 4839\u20134849","DOI":"10.1109\/WACV57701.2024.00477"},{"key":"5495_CR22","unstructured":"Duan M, Suri A, Mireshghallah N et al (2024) Do membership inference attacks work on large language models? arXiv preprint arXiv:2402.07841"},{"key":"5495_CR23","doi-asserted-by":"crossref","unstructured":"Wang X, Wu L, Guan Z, GradDiff (2023) Gradient-based membership inference attacks against federated distillation with differential comparison. Inf Sci: 120068","DOI":"10.1016\/j.ins.2023.120068"},{"key":"5495_CR24","doi-asserted-by":"crossref","unstructured":"Zhu C, Zhang J, Cheng X et al (2022) MIA-Leak: Exploring membership inference attacks in federated learning systems[C]. International Conference on Blockchain Technology and Emerging Applications. Springer Nature Switzerland, Cham, 140\u2013154","DOI":"10.1007\/978-3-031-31420-9_9"},{"key":"5495_CR25","doi-asserted-by":"crossref","unstructured":"Liu Z, Zhang X, Chen C et al (2022) Membership inference attacks against robust graph neural network[C]. International Symposium on Cyberspace Safety and Security. Springer International Publishing, Cham, 259\u2013273","DOI":"10.1007\/978-3-031-18067-5_19"},{"key":"5495_CR26","doi-asserted-by":"crossref","unstructured":"Oh MG, Park LH, Kim J et al (2022) On membership inference attacks to generative language models across language domains[C]. International Conference on Information Security Applications. Springer Nature Switzerland, Cham, 143\u2013155","DOI":"10.1007\/978-3-031-25659-2_11"},{"key":"5495_CR27","unstructured":"Oord A, Li Y, Vinyals O (2018) Representation learning with contrastive predictive coding. arXiv preprint arXiv:1807.03748"},{"key":"5495_CR28","doi-asserted-by":"crossref","unstructured":"Gao T, Yao X, Chen D (2021) SimCSE: Simple contrastive learning of sentence embeddings[C]. Conference on Empirical Methods in Natural Language Processing, EMNLP 2021. Association for Computational Linguistics (ACL), 6894\u20136910","DOI":"10.18653\/v1\/2021.emnlp-main.552"},{"key":"5495_CR29","unstructured":"Chen T, Kornblith S, Norouzi M et al (2020) A simple framework for contrastive learning of visual representations[C]. International conference on machine learning. PMLR, 1597\u20131607"},{"key":"5495_CR30","doi-asserted-by":"crossref","unstructured":"Liu H, Jia J, Qu W et al (2021) EncoderMI: Membership inference against pre-trained encoders in contrastive learning[C]. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2081\u20132095","DOI":"10.1145\/3460120.3484749"},{"key":"5495_CR31","unstructured":"Li G, Rezaei S, Liu X (2022) User-level membership inference attack against metric embedding learning[C]. ICLR 2022 Workshop on PAIR^ 2Struct: Privacy, Accountability, Interpretability, Robustness, Reasoning on Structured Data"},{"key":"5495_CR32","doi-asserted-by":"crossref","unstructured":"Sui H, Sun X, Zhang J et al (2023) Multi-level membership inference attacks in federated learning based on active GAN[J]. Neural Comput Appl: 1\u201315","DOI":"10.1007\/s00521-023-08593-y"},{"key":"5495_CR33","doi-asserted-by":"crossref","unstructured":"Jin Y, Lou W, Gao Y (2023) Membership inference attacks against compression models. Computing: 1\u201324","DOI":"10.1007\/s00607-023-01180-y"},{"key":"5495_CR34","first-page":"14","volume":"6","author":"Y Bai","year":"2021","unstructured":"Bai Y, Chen T, Fan M (2021) A survey on membership inference attacks against machine learning. Management 6:14","journal-title":"Management"},{"key":"5495_CR35","first-page":"4328","volume":"35","author":"X Li","year":"2022","unstructured":"Li X, Thickstun J, Gulrajani I et al (2022) Diffusion-lm improves controllable text generation. Adv Neural Inf Process Syst 35:4328\u20134343","journal-title":"Adv Neural Inf Process Syst"},{"key":"5495_CR36","unstructured":"Kenton J, Bert (2019) Pre-training of deep bidirectional transformers for language understanding[C]. Proceedings of naacL-HLT. 1: 2"},{"key":"5495_CR37","doi-asserted-by":"crossref","unstructured":"He X, Lyu L, Sun L et al (2021) Model extraction and adversarial transferability, your BERT is vulnerable![C]. Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2006\u20132012","DOI":"10.18653\/v1\/2021.naacl-main.161"},{"key":"5495_CR38","unstructured":"Sablayrolles A, Douze M, Schmid C et al (2019) White-box vs black-box: Bayes optimal strategies for membership inference[C]. International Conference on Machine Learning. PMLR, 5558\u20135567"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-05495-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-024-05495-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-05495-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T12:26:23Z","timestamp":1723033583000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-024-05495-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":38,"journal-issue":{"issue":"17-18","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["5495"],"URL":"https:\/\/doi.org\/10.1007\/s10489-024-05495-x","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2024,6,19]]},"assertion":[{"value":"29 April 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Written informed consent was obtained for each participant according to federal and institutional guidelines.\u00a0","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human participants and\/or animals"}},{"value":"All authors disclosed no relevant relationships.No potential conflict of interest was reported by the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}