{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T02:46:05Z","timestamp":1773888365274,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000646","name":"JSPS KAKENHI","doi-asserted-by":"publisher","award":["JP19H04113"],"award-info":[{"award-number":["JP19H04113"]}],"id":[{"id":"10.13039\/501100000646","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009024","name":"ERATO HASUO Metamathematics for Systems Design","doi-asserted-by":"publisher","award":["JPMJER1603"],"award-info":[{"award-number":["JPMJER1603"]}],"id":[{"id":"10.13039\/501100009024","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001695","name":"JST","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001695","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9534207","type":"proceedings-article","created":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T20:32:37Z","timestamp":1632342757000},"page":"1-10","source":"Crossref","is-referenced-by-count":10,"title":["TransMIA: Membership Inference Attacks Using Transfer Shadow Training"],"prefix":"10.1109","author":[{"given":"Seira","family":"Hidano","sequence":"first","affiliation":[]},{"given":"Takao","family":"Murakami","sequence":"additional","affiliation":[]},{"given":"Yusuke","family":"Kawamoto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"TransMIA: Membership Inference Attacks Using Transfer Shadow Training","volume":"abs 2011 14661","author":"hidano","year":"2020","journal-title":"CoRR"},{"key":"ref38","article-title":"Deep residual learning for image recognition","volume":"abs 1512 3385","author":"he","year":"2015","journal-title":"CoRR"},{"key":"ref33","first-page":"61","article-title":"Membership inference attack against differentially private deep learning model","volume":"11","author":"rahman","year":"2018","journal-title":"Trans Data Privacy"},{"key":"ref32","article-title":"DAMIA: leveraging domain adaptation as a defense against membership inference attacks","volume":"abs 2005 8016","author":"huang","year":"2020","journal-title":"CoRR"},{"key":"ref31","article-title":"Defending model inversion and membership inference attacks via prediction purification","volume":"abs 2005 3915","author":"yang","year":"2020","journal-title":"CoRR"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363201"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10584-0_22"},{"key":"ref10","first-page":"1","article-title":"Semi-supervised knowledge transfer for deep learning from private training data","author":"papernot","year":"0","journal-title":"Proc ICLR'17"},{"key":"ref40","first-page":"429","article-title":"Local privacy and statistical minimax rates","author":"duchi","year":"0","journal-title":"Proc IEEE FOCS'13"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10928-8_48"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/571"},{"key":"ref13","article-title":"Privacy analysis of deep learning in the wild: Membership inference attacks against transfer learning","volume":"abs 2009 4872","author":"zou","year":"2020","journal-title":"CoRR"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref15","author":"morris","year":"2020","journal-title":"Hackers had a banner year in 2019"},{"key":"ref16","author":"seals","year":"2017","journal-title":"Data breaches increase 40% in 2016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"133","DOI":"10.2478\/popets-2019-0008","article-title":"LOGAN: Evaluating privacy leakage of generative models using generative adversarial networks","volume":"1","author":"hayes","year":"2019","journal-title":"PoPETs"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0067"},{"key":"ref28","first-page":"1310","article-title":"Privacy-preserving deep learning","author":"shokri","year":"0","journal-title":"Proc ACM CCS'15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref3","first-page":"17","article-title":"Deep learning of representations for unsupervised and transfer learning","author":"bengio","year":"0","journal-title":"ICML 2011 Unsupervised and Transfer Learning Workshop"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0043-6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005992"},{"key":"ref7","year":"0","journal-title":"EU General Data Protection Regulation (GDPR)"},{"key":"ref2","first-page":"164","article-title":"Deep learners benefit more from out-of-distribution examples","author":"bengio","year":"0","journal-title":"Proc AISTATS'11"},{"key":"ref9","article-title":"Privacy-preserving transfer learning for knowledge sharing","volume":"1811 9491v1","author":"guo","year":"2018","journal-title":"CoRR"},{"key":"ref1","first-page":"657","article-title":"Learning many related tasks at the same time with backpropagation","author":"caruana","year":"0","journal-title":"Proc NIPS 94"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354211"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23183"},{"key":"ref21","article-title":"Membership inference attacks and defenses in supervised learning via generalization gap","volume":"abs 2002 12062","author":"li","year":"2020","journal-title":"CoRR"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68711-7_23"},{"key":"ref24","article-title":"Systematic evaluation of privacy risks of machine learning models","volume":"abs 2003 10595","author":"song","year":"2020","journal-title":"CoRR"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.27"},{"key":"ref23","article-title":"Re-visiting membership inference under realistic assumptions","volume":"abs 2005 10881","author":"jayaraman","year":"2020","journal-title":"CoRR"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23119"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243855"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","location":"Shenzhen, China","start":{"date-parts":[[2021,7,18]]},"end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09534207.pdf?arnumber=9534207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T23:22:06Z","timestamp":1673306526000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9534207\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9534207","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}