{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T09:19:17Z","timestamp":1769764757892,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/icccn49398.2020.9209744","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T20:59:41Z","timestamp":1601499581000},"page":"1-9","source":"Crossref","is-referenced-by-count":28,"title":["Beyond Model-Level Membership Privacy Leakage: an Adversarial Approach in Federated Learning"],"prefix":"10.1109","author":[{"given":"Jiale","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jiale","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yanchao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Han","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.56"},{"key":"ref11","first-page":"1333","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"aono","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref13","article-title":"Differentially private federated learning: A client level perspective","author":"geyer","year":"2017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref15","first-page":"61","article-title":"Membership inference attack against differentially private deep learning model","volume":"11","author":"rahman","year":"2018","journal-title":"Transactions on Data Privacy"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"ref17","article-title":"Understanding membership inferences on well-generalized learning 282. models","author":"long","year":"2018","journal-title":"arXiv Cryptography and Security"},{"key":"ref18","article-title":"Evaluating privacy leakage of generative models using generative adversarial networks. arxiv 2017","author":"hayes","year":"0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00057"},{"key":"ref28","first-page":"1","article-title":"Cifar-10 image classification with convolutional neural networks for embedded systems","author":"\u00e7alik","year":"2018","journal-title":"2018 IEEE\/ACS 15th International Conference on Computer Systems and Applications (AICCSA)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3291276.3295691"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"ref3","article-title":"Federated learning with non-iid data","author":"zhao","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23119"},{"key":"ref29","article-title":"Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers","author":"ateniese","year":"2013"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"ref7","article-title":"Comprehensive privacy analysis of deep learning","author":"nasr","year":"0","journal-title":"2019 IEEE Symposium on Security and Privacy"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1145\/2810103.2813687","article-title":"Privacy-preserving deep learning","author":"shokri","year":"2015","journal-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00139"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref22","first-page":"601","article-title":"Stealing machine learning models via prediction apis","author":"tramer","year":"2016","journal-title":"Proceedings Of The 25Th Usenix Security Symposium no CONF"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref24","article-title":"Federated learning: Strategies for improving communication efficiency","author":"kone?ny","year":"2016"},{"key":"ref23","article-title":"Inference attacks against collaborative learning","author":"melis","year":"2018"},{"key":"ref26","article-title":"Conditional generative adversarial nets","author":"mirza","year":"2014"},{"key":"ref25","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"Artificial Intelligence and Statistics"}],"event":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","location":"Honolulu, HI, USA","start":{"date-parts":[[2020,8,3]]},"end":{"date-parts":[[2020,8,6]]}},"container-title":["2020 29th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9205796\/9209588\/09209744.pdf?arnumber=9209744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:16:35Z","timestamp":1656375395000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9209744\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icccn49398.2020.9209744","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}