{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T06:30:00Z","timestamp":1773815400811,"version":"3.50.1"},"reference-count":35,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1016\/j.jisa.2025.104302","type":"journal-article","created":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T14:23:50Z","timestamp":1763562230000},"page":"104302","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Enhancing black-box membership inference attacks in federated learning"],"prefix":"10.1016","volume":"96","author":[{"given":"Qiang","family":"Shi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1329-3191","authenticated-orcid":false,"given":"Luzhen","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Xinfeng","family":"He","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2025.104302_b1","series-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2023"},{"key":"10.1016\/j.jisa.2025.104302_b2","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MNET.011.2000215","article-title":"Keep your data locally: Federated-learning-based data privacy preservation in edge computing","volume":"35","author":"Liu","year":"2021","journal-title":"IEEE Netw"},{"key":"10.1016\/j.jisa.2025.104302_b3","doi-asserted-by":"crossref","first-page":"46","DOI":"10.70470\/SHIFRA\/2025\/002","article-title":"Federated learning in healthcare: A bibliometric analysis of privacy, security, and adversarial threats (2021\u20132024)","volume":"2025","author":"Almaiah","year":"2025","journal-title":"Shifra"},{"key":"10.1016\/j.jisa.2025.104302_b4","series-title":"A survey of what to share in federated learning: Perspectives on model utility, privacy leakage, and communication efficiency","author":"Shao","year":"2024"},{"key":"10.1016\/j.jisa.2025.104302_b5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3704633","article-title":"Membership inference attacks and defenses in federated learning: A survey","volume":"57","author":"Bai","year":"2025","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.jisa.2025.104302_b6","first-page":"1","article-title":"Membership inference attacks on machine learning: A survey","volume":"54","author":"Hu","year":"2022","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.jisa.2025.104302_b7","series-title":"Membership inference attacks on large-scale models: A survey","author":"Wu","year":"2025"},{"key":"10.1016\/j.jisa.2025.104302_b8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3446374","article-title":"Generative adversarial networks (GANs)","volume":"54","author":"Saxena","year":"2022","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.jisa.2025.104302_b9","doi-asserted-by":"crossref","first-page":"21465","DOI":"10.1007\/s00521-021-05982-z","article-title":"Synthetic data generation using DCGAN for improved traffic sign recognition","volume":"34","author":"Dewi","year":"2022","journal-title":"Neural Comput Appl"},{"key":"10.1016\/j.jisa.2025.104302_b10","series-title":"2023 IEEE\/CVF international conference on computer vision","first-page":"4848","article-title":"Practical membership inference attacks against large-scale multi-modal models: A pilot study","author":"Ko","year":"2023"},{"key":"10.1016\/j.jisa.2025.104302_b11","series-title":"M4I: Multi-modal models membership inference: Multi-modal models membership inference","author":"Hu","year":"2022"},{"key":"10.1016\/j.jisa.2025.104302_b12","doi-asserted-by":"crossref","first-page":"4903","DOI":"10.1007\/s10994-022-06296-4","article-title":"A theoretical distribution analysis of synthetic minority oversampling technique (SMOTE) for imbalanced learning","volume":"113","author":"Elreedy","year":"2024","journal-title":"Mach Learn"},{"key":"10.1016\/j.jisa.2025.104302_b13","article-title":"Research and application of XGBoost in imbalanced data","volume":"18","author":"Zhang","year":"2022","journal-title":"Int J Distrib Sens Networks"},{"key":"10.1016\/j.jisa.2025.104302_b14","doi-asserted-by":"crossref","first-page":"232","DOI":"10.2478\/popets-2019-0067","article-title":"Monte Carlo and reconstruction membership inference attacks against generative models","volume":"2019","author":"Hilprecht","year":"2019","journal-title":"Proc Priv Enhancing Technol"},{"key":"10.1016\/j.jisa.2025.104302_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.112899","article-title":"Synthetic data for enhanced privacy: A VAE-GAN approach against membership inference attacks","volume":"309","author":"Yan","year":"2025","journal-title":"Knowl-Based Syst"},{"key":"10.1016\/j.jisa.2025.104302_b16","series-title":"Synthetic is all you need: Removing the auxiliary data assumption for membership inference attacks against synthetic data","first-page":"182","author":"Gu\u00e9pin","year":"2024"},{"key":"10.1016\/j.jisa.2025.104302_b17","series-title":"A systematic review of federated generative models","author":"Gargary","year":"2024"},{"key":"10.1016\/j.jisa.2025.104302_b18","doi-asserted-by":"crossref","first-page":"7327","DOI":"10.1109\/TPAMI.2021.3116668","article-title":"Deep generative modelling: A comparative review of VAEs, GANs, normalizing flows, energy-based and autoregressive models","volume":"44","author":"Bond-Taylor","year":"2022","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10.1016\/j.jisa.2025.104302_b19","doi-asserted-by":"crossref","first-page":"10850","DOI":"10.1109\/TPAMI.2023.3261988","article-title":"Diffusion models in vision: A survey","volume":"45","author":"Croitoru","year":"2023","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10.1016\/j.jisa.2025.104302_b20","doi-asserted-by":"crossref","first-page":"110","DOI":"10.70470\/SHIFRA\/2025\/007","article-title":"An integrated federated learning framework with optimization for industrial IoT intrusion detection","volume":"2025","author":"Ali","year":"2025","journal-title":"Shifra"},{"key":"10.1016\/j.jisa.2025.104302_b21","doi-asserted-by":"crossref","first-page":"13","DOI":"10.70470\/ESTIDAMAA\/2025\/002","article-title":"Federated learning for smart and sustainable forest fire detection in green internet of things","volume":"2025","author":"Ali","year":"2025","journal-title":"Estidamaa"},{"key":"10.1016\/j.jisa.2025.104302_b22","series-title":"2017 IEEE symposium on security and privacy","first-page":"3","article-title":"Membership inference attacks against machine learning models","author":"Shokri","year":"2017"},{"key":"10.1016\/j.jisa.2025.104302_b23","series-title":"Membership inference via backdooring","author":"Hu","year":"2022"},{"key":"10.1016\/j.jisa.2025.104302_b24","series-title":"Amplifying membership exposure via data poisoning","author":"Chen","year":"2022"},{"key":"10.1016\/j.jisa.2025.104302_b25","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103535","article-title":"Enhance membership inference attacks in federated learning","volume":"136","author":"He","year":"2024","journal-title":"Comput Secur"},{"key":"10.1016\/j.jisa.2025.104302_b26","series-title":"DocMIA: Document-level membership inference attacks against DocVQA models","author":"Nguyen","year":"2025"},{"key":"10.1016\/j.jisa.2025.104302_b27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.58496\/BJIoT\/2023\/001","article-title":"Federated learning in IoT: A survey on distributed decision making","volume":"2023","author":"Hameed","year":"2023","journal-title":"Babylon J Internet Things"},{"key":"10.1016\/j.jisa.2025.104302_b28","series-title":"2018 IEEE 31st computer security foundations symposium","first-page":"268","article-title":"Privacy risk in machine learning: Analyzing the connection to overfitting","author":"Yeom","year":"2018"},{"key":"10.1016\/j.jisa.2025.104302_b29","doi-asserted-by":"crossref","DOI":"10.1016\/j.cmpb.2023.107660","article-title":"ResNet and its application to medical image processing: Research progress and challenges","volume":"240","author":"Xu","year":"2023","journal-title":"Comput Methods Programs Biomed"},{"key":"10.1016\/j.jisa.2025.104302_b30","first-page":"77","article-title":"A review on federated learning","author":"Chuanxu","year":"2021","journal-title":"Chin J Netw Inf Secur"},{"key":"10.1016\/j.jisa.2025.104302_b31","first-page":"523","article-title":"Federated learning in resource constrained scenarios: A comprehensive survey","author":"Wang","year":"2023","journal-title":"J Univ Chin Acad Sci"},{"key":"10.1016\/j.jisa.2025.104302_b32","article-title":"A survey on fairness in federated learning","volume":"10","author":"Zhu","year":"2024","journal-title":"Big Data Res"},{"key":"10.1016\/j.jisa.2025.104302_b33","doi-asserted-by":"crossref","DOI":"10.1002\/gamm.202100008","article-title":"An introduction to deep generative modeling","volume":"44","author":"Ruthotto","year":"2021","journal-title":"GAMM-Mitt"},{"key":"10.1016\/j.jisa.2025.104302_b34","series-title":"2024 IEEE 2nd international conference on sensors, electronics and computer engineering","first-page":"1251","article-title":"Exploration of attention mechanism-enhanced deep learning models in the mining of medical textual data","author":"Xiao","year":"2024"},{"key":"10.1016\/j.jisa.2025.104302_b35","doi-asserted-by":"crossref","first-page":"4316","DOI":"10.3390\/app14104316","article-title":"A historical survey of advances in transformer architectures","volume":"14","author":"Sajun","year":"2024","journal-title":"Appl Sci"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212625003394?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212625003394?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T05:36:46Z","timestamp":1773812206000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212625003394"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":35,"alternative-id":["S2214212625003394"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2025.104302","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhancing black-box membership inference attacks in federated learning","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2025.104302","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104302"}}