{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:40:59Z","timestamp":1730266859404,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,30]]},"DOI":"10.1109\/ijcnn60899.2024.10651285","type":"proceedings-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:35:05Z","timestamp":1725903305000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Confidence Score Exploiting Attacks on Classification Trees and Random Forest Classifiers"],"prefix":"10.1109","author":[{"given":"Batnyam","family":"Enkhtaivan","sequence":"first","affiliation":[{"name":"NEC Corporation,Secure System Platform Research Laboratories,Kanagawa,Japan"}]},{"given":"Isamu","family":"Teranishi","sequence":"additional","affiliation":[{"name":"NEC Corporation,Secure System Platform Research Laboratories,Kanagawa,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTSN53084.2022.9761288"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIBD51990.2021.9458968"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISACC56298.2023.10084209"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13428-4"},{"key":"ref5","first-page":"105400","article-title":"Decision tree-based diagnosis of coronary artery disease: Cart model","volume-title":"Computer Methods and Programs in Biomedicine","volume":"192","author":"Ghiasi","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/01605682.2019.1581405"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3428363.3428375"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SKIMA.2015.7399985"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3183083"},{"issue":"109","key":"ref10","first-page":"A001","article-title":"Fintech in financial inclusion: Machine learning applications in assessing credit risk","volume-title":"IMF Working Papers","volume":"2019","author":"Bazarbash","year":"2019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0240362"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3558819.3565138"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899x\/1022\/1\/012042"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899x\/612\/5\/052051"},{"issue":"8","key":"ref15","first-page":"e02310","article-title":"Stock selection with random forest: An exploitation of excess return in the chinese stock market","volume-title":"Heliyon","volume":"5","author":"Tan","year":"2019"},{"issue":"2","key":"ref16","first-page":"465","article-title":"A random forest classifier for lymph diseases","volume-title":"Computer Methods and Programs in Biomedicine","volume":"113","author":"Azar","year":"2014"},{"issue":"24","key":"ref17","article-title":"Predictive modeling of icu healthcare-associated infections from imbalanced data. using ensembles and a clustering-based undersampling approach","volume-title":"Applied Sciences","volume":"9","author":"Sanchez-Hernandez","year":"2019"},{"key":"ref18","first-page":"633","volume-title":"Random Forest for Genomic Prediction","author":"Montesinos L\u00f3pez","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4236\/tel.2018.83032"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2991\/978-94-6463-042-8_84"},{"key":"ref21","article-title":"A survey of privacy attacks in machine learning","volume-title":"CoRR","author":"Rigaki","year":"2020"},{"key":"ref22","first-page":"101940","article-title":"Privacy attacks against deep learning models and their countermeasures","volume-title":"Journal of Systems Architecture","volume":"114","author":"Shafee","year":"2021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3034721"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01572"},{"key":"ref25","article-title":"Variational model inversion attacks","volume-title":"Advances in Neural Information Processing Systems","author":"Wang","year":"2021"},{"key":"ref26","first-page":"17","article-title":"Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing","volume-title":"Proceedings of the \u2026 USENIX Security Symposium. UNIX Security Symposium","volume":"2014","author":"Fredrikson"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref28","first-page":"4579","article-title":"Are your sensitive attributes private? novel model inversion attribute inference attacks on classification models","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Mehnaz"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560663"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1201.0490"},{"article-title":"UCI machine learning repository","year":"2017","author":"Dua","key":"ref32"},{"article-title":"Social science research on pornography","year":"2017","author":"Price","key":"ref34"},{"journal-title":"General social surveys, 1972-2012","year":"2013","author":"Smith","key":"ref35"},{"key":"ref36","article-title":"Towards the science of security and privacy in machine learning","volume-title":"CoRR","author":"Papernot","year":"2016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2016.32"}],"event":{"name":"2024 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2024,6,30]]},"location":"Yokohama, Japan","end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10649807\/10649898\/10651285.pdf?arnumber=10651285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T06:39:01Z","timestamp":1725950341000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10651285\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,30]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/ijcnn60899.2024.10651285","relation":{},"subject":[],"published":{"date-parts":[[2024,6,30]]}}}