{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:59:11Z","timestamp":1764053951729,"version":"3.40.5"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100002462","name":"Deloitte","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002462","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,17]]},"DOI":"10.1109\/icnc64010.2025.10994180","type":"proceedings-article","created":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T17:44:51Z","timestamp":1747158291000},"page":"510-515","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Drift: Evolving Privacy Concerns in Incremental Learning"],"prefix":"10.1109","author":[{"given":"Sayyed Farid","family":"Ahamed","sequence":"first","affiliation":[{"name":"Old Dominion University,Center for Secure &amp; Intelligent Critical Systems,Virginia,USA"}]},{"given":"Soumya","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Old Dominion University,Center for Secure &amp; Intelligent Critical Systems,Virginia,USA"}]},{"given":"Sandip","family":"Roy","sequence":"additional","affiliation":[{"name":"Old Dominion University,Center for Secure &amp; Intelligent Critical Systems,Virginia,USA"}]},{"given":"Aayush","family":"Kapoor","sequence":"additional","affiliation":[{"name":"Old Dominion University,Center for Secure &amp; Intelligent Critical Systems,Virginia,USA"}]},{"given":"Marc","family":"Vucovich","sequence":"additional","affiliation":[{"name":"Deloitte &amp; Touche LLP"}]},{"given":"Kevin","family":"Choi","sequence":"additional","affiliation":[{"name":"Deloitte &amp; Touche LLP"}]},{"given":"Abdul","family":"Rahman","sequence":"additional","affiliation":[{"name":"Deloitte &amp; Touche LLP"}]},{"given":"Edward","family":"Bowen","sequence":"additional","affiliation":[{"name":"Deloitte &amp; Touche LLP"}]},{"given":"Sachin","family":"Shetty","sequence":"additional","affiliation":[{"name":"Old Dominion University,Center for Secure &amp; Intelligent Critical Systems,Virginia,USA"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/CVPR.2019.00046"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/BF00116895"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ICNC59896.2024.10556313"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/SP.2017.41"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/CVPR.2019.00247"},{"key":"ref6","first-page":"797","article-title":"{PrivateEye}: Scalable and {Privacy-Preserving} compromise detection in the cloud","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Arzani"},{"year":"2021","author":"Ackerman","article-title":"Automatically detecting data drift in machine learning classifiers","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TKDE.2018.2876857"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s11263-015-0816-y"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-81-322-3972-7_19"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.patcog.2011.06.019"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/BigData52589.2021.9671279"},{"key":"ref13","first-page":"29 960","article-title":"Adapting to online label shift with provable guarantees","volume":"35","author":"Bai","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2523813"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.24963\/ijcai.2017\/317"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.artint.2015.09.009"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/SP46215.2023.10179463"},{"year":"2024","author":"Ahamed","article-title":"Accuracy-privacy trade-off in the mitigation of membership inference attack in federated learning","key":"ref18"},{"year":"2022","author":"Roth","article-title":"Nvidia flare: Federated learning from simulation to real-world","key":"ref19"},{"key":"ref20","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Artificial intelligence and statistics.","author":"McMahan","year":"2017"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1214\/aoms\/1177729586"},{"year":"2014","author":"Kingma","article-title":"Adam: A method for stochastic optimization","key":"ref22"}],"event":{"name":"2025 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2025,2,17]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2025,2,20]]}},"container-title":["2025 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10993495\/10993515\/10994180.pdf?arnumber=10994180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:14:27Z","timestamp":1747199667000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10994180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,17]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icnc64010.2025.10994180","relation":{},"subject":[],"published":{"date-parts":[[2025,2,17]]}}}