{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:02:08Z","timestamp":1730235728340,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T00:00:00Z","timestamp":1721606400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T00:00:00Z","timestamp":1721606400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,22]]},"DOI":"10.1109\/iccp61108.2024.10644615","type":"proceedings-article","created":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T18:44:08Z","timestamp":1724870648000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Deepmarking: Leveraging Adversarial Noise for Membership Inference Attacks"],"prefix":"10.1109","author":[{"given":"Malthe Andreas","family":"Lejb\u00f8lle Jelstrup","sequence":"first","affiliation":[{"name":"Technical University of Denmark,Visual Compute Section,Compute Department"}]},{"given":"Siavash Arjomand","family":"Bigdeli","sequence":"additional","affiliation":[{"name":"Technical University of Denmark,Visual Compute Section,Compute Department"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Learning multiple layers of features from tiny images","volume-title":"Tech. Rep.","author":"Krizhevsky","year":"2009"},{"volume-title":"Tiny imagenet visual recognition challenge","year":"2015","author":"Le","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"journal-title":"Membership inference attacks on dnns using adversarial perturbations","year":"2023","author":"Ali","key":"ref5"},{"key":"ref6","article-title":"Scalable membership inference attacks via quantile regression","volume":"36","author":"Bertran","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"journal-title":"Membership inference attacks via adversarial examples","year":"2022","author":"Jalalzai","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560554"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3523273"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3620667"},{"key":"ref12","article-title":"Towards deep learning models resistant to adversarial attacks","volume-title":"International Conference on Learning Representations","author":"Madry","year":"2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"journal-title":"Reconstructing training data from trained neural networks","year":"2022","author":"Haim","key":"ref14"},{"key":"ref15","article-title":"Gradient descent maximizes the margin of homogeneous neural networks","volume":"abs\/1906.05890","author":"Lyu","year":"2019","journal-title":"CoRR"},{"key":"ref16","article-title":"Directional convergence and alignment in deep learning","volume":"abs\/2006.06657","author":"Ji","year":"2020","journal-title":"CoRR"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"ref18","first-page":"657","article-title":"Hiding data with deep networns","volume-title":"Proceeding of the European Conference on Computer Vision","author":"Zhu"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01356"},{"key":"ref20","article-title":"Membership inference attacks from first principles","volume":"abs\/2112.03570","author":"Carlini","year":"2021","journal-title":"CoRR"},{"journal-title":"Scalable membership inference attacks via quantile regression","year":"2023","author":"Bertran","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803803"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(92)90242-F"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1241"}],"event":{"name":"2024 IEEE International Conference on Computational Photography (ICCP)","start":{"date-parts":[[2024,7,22]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2024,7,24]]}},"container-title":["2024 IEEE International Conference on Computational Photography (ICCP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10644133\/10644222\/10644615.pdf?arnumber=10644615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T10:40:38Z","timestamp":1725446438000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10644615\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,22]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iccp61108.2024.10644615","relation":{},"subject":[],"published":{"date-parts":[[2024,7,22]]}}}