{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:40:53Z","timestamp":1755999653201,"version":"3.28.0"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T00:00:00Z","timestamp":1712620800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T00:00:00Z","timestamp":1712620800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,9]]},"DOI":"10.1109\/satml59370.2024.00009","type":"proceedings-article","created":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T17:22:05Z","timestamp":1715361725000},"page":"1-17","source":"Crossref","is-referenced-by-count":1,"title":["Probabilistic Dataset Reconstruction from Interpretable Models"],"prefix":"10.1109","author":[{"given":"Julien","family":"Ferry","sequence":"first","affiliation":[{"name":"Universit&#x00E9; de Toulouse, CNRS,LAAS-CNRS,Toulouse,France"}]},{"given":"Ulrich","family":"A\u00efvodji","sequence":"additional","affiliation":[{"name":"&#x00C9;cole de Technologie Sup&#x00E9;rieure,Montr&#x00E9;al,Canada"}]},{"given":"S\u00e9bastien","family":"Gambs","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; du Qu&#x00E9;bec &#x00E0; Montr&#x00E9;al,Montr&#x00E9;al,Canada"}]},{"given":"Marie-Jos\u00e9","family":"Huguet","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; de Toulouse, CNRS, INSA,LAAS-CNRS,Toulouse,France"}]},{"given":"Mohamed","family":"Siala","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; de Toulouse, CNRS, INSA,LAAS-CNRS,Toulouse,France"}]}],"member":"263","reference":[{"key":"ref1","first-page":"274","article-title":"Reconstruction attack through classifier analysis","volume-title":"Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings","volume":"7371","author":"Gambs"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3236009"},{"key":"ref3","article-title":"Extracting tree-structured representations of trained networks","volume":"8","author":"Craven","year":"1995","journal-title":"Advances in neural information processing systems"},{"article-title":"Interpretable & explorable approximations of black box models","year":"2017","author":"Lakkaraju","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3321\/j.issn:0529-6579.2007.z1.029"},{"key":"ref7","first-page":"161","article-title":"Fairwashing: the risk of rationalization","volume-title":"International Conference on Machine Learning","author":"A\u00efvodji"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375830"},{"article-title":"You shouldn\u2019t trust me: Learning models which conceal unfairness from multiple explanation methods","year":"2020","author":"Dimanov","key":"ref9"},{"article-title":"Fooling shap with stealthily biased sampling","year":"2022","author":"Laberge","key":"ref10"},{"key":"ref11","first-page":"14822","article-title":"Characterizing the risk of fairwashing","volume":"34","author":"A\u00efvodji","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2594473.2594475"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/bf00058680"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098047"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5168-9"},{"volume-title":"Classification and Regression Trees","year":"1984","author":"Breiman","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-060116-054123"},{"key":"ref18","article-title":"A survey of privacy attacks in machine learning","volume-title":"CoRR","author":"Rigaki","year":"2020"},{"key":"ref19","article-title":"An overview of privacy in machine learning","volume-title":"CoRR","author":"Cristofaro","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250804"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.711"},{"key":"ref23","first-page":"1081","article-title":"When the signal is in the noise: Exploiting diffix\u2019s sticky noise","volume-title":"28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019","author":"Gadotti"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3291276.3295691"},{"key":"ref25","first-page":"17","article-title":"Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing","volume-title":"Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014","author":"Fredrikson"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134077"},{"key":"ref28","first-page":"267","article-title":"The secret sharer: Evaluating and testing unintended memorization in neural networks","volume-title":"28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019","author":"Carlini"},{"key":"ref29","first-page":"100","article-title":"Privacy-preserving deep learning: Revisited and enhanced","volume-title":"Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings","volume":"719","author":"Phong"},{"key":"ref30","first-page":"1291","article-title":"Updates-leak: Data set inference and reconstruction attacks in online learning","volume-title":"29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020","author":"Salem"},{"article-title":"Inference attack and defense on the distributed private fair learning framework","volume-title":"The AAAI Workshop on Privacy-Preserving Artificial Intelligence","author":"Hu","key":"ref31"},{"article-title":"Dikaios: Privacy auditing of algorithmic fairness via attribute inference attacks","year":"2022","author":"Aalmoes","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594086"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1109\/SaTML54575.2023.00012","article-title":"Exploiting fairness to enhance sensitive attributes reconstruction","volume-title":"First IEEE Conference on Secure and Trustworthy Machine Learning","author":"Ferry"},{"issue":"3","key":"ref35","first-page":"671","article-title":"Big data\u2019s disparate impact","volume-title":"California Law Review","volume":"104","author":"Barocas","year":"2016"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1201.0490"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/nav.3800020109"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1137\/0105003"},{"issue":"234","key":"ref39","first-page":"1","article-title":"Learning certifiably optimal rule lists for categorical data","volume":"18","author":"Angelino","year":"2018","journal-title":"Journal of Machine Learning Research"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01879-4","volume-title":"Probabilistic Databases","author":"Suciu","year":"2011"},{"key":"ref41","first-page":"3146","article-title":"Learning optimal decision trees using caching branch-and-bound search","volume-title":"The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, IAAI 2020, The Tenth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, 2020","author":"Aglin"},{"key":"ref42","first-page":"5222","article-title":"Pydl8.5: a library for learning optimal decision trees","volume-title":"Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI 2020","author":"Aglin"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.21105\/joss.03192"},{"article-title":"UCI machine learning repository","year":"2017","author":"Dua","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1201\/9781003278290-37"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835868"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3337064"}],"event":{"name":"2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)","start":{"date-parts":[[2024,4,9]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2024,4,11]]}},"container-title":["2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10516617\/10516618\/10516646.pdf?arnumber=10516646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T04:26:04Z","timestamp":1715401564000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10516646\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,9]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/satml59370.2024.00009","relation":{},"subject":[],"published":{"date-parts":[[2024,4,9]]}}}