{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T19:12:14Z","timestamp":1764270734966,"version":"3.46.0"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Asian Institute of Digital Finance","award":["A-0003504-09-00"],"award-info":[{"award-number":["A-0003504-09-00"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1109\/tai.2024.3445326","type":"journal-article","created":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T13:40:13Z","timestamp":1724074813000},"page":"93-106","source":"Crossref","is-referenced-by-count":2,"title":["meMIA: Multilevel Ensemble Membership Inference Attack"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2028-8166","authenticated-orcid":false,"given":"Najeeb","family":"Ullah","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4629-7589","authenticated-orcid":false,"given":"Muhammad Naveed","family":"Aman","sequence":"additional","affiliation":[{"name":"School of Computing, University of Nebraska-Lincoln, Lincoln, NE, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0084-4647","authenticated-orcid":false,"given":"Biplab","family":"Sikdar","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, National University of Singapore, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"article-title":"Stealing links from graph neural networks","year":"2020","author":"He","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00029"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2019.00509"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2018.00035"},{"key":"ref6","article-title":"Updates-leak:","author":"Salem","year":"2019","journal-title":"Data set inference and reconstruction attacks in online learning"},{"key":"ref7","article-title":"ML-Leaks:","author":"Salem","year":"2018","journal-title":"model and data independent membership inference attacks and defenses on machine learning"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"article-title":"Overlearning reveals sensitive attributes","year":"2020","author":"Song","key":"ref9"},{"article-title":"Stealing machine learning models via prediction APIs","year":"2016","author":"Tram\u00e8r","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"ref12","article-title":"Membership inference on word embedding and beyond","author":"Mahloujifar","year":"2021","journal-title":"Jun"},{"article-title":"Subject membership inference attacks in federated learning","year":"2023","author":"Suri","key":"ref13"},{"key":"ref14","article-title":"On the discredibility of membership inference attacks","author":"Rezaei","year":"2023","journal-title":"Apr"},{"article-title":"Membership inference attacks against text-to-image generation models","year":"2022","author":"Wu","key":"ref15"},{"article-title":"This person (probably) exists. Identity membership attacks against GAN generated faces","year":"2021","author":"Webster","key":"ref16"},{"article-title":"Property inference attacks against GANs","year":"2021","author":"Zhou","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0005"},{"key":"ref19","article-title":"Node-level membership inference attacks against graph neural networks","author":"He","year":"2021","journal-title":"Feb"},{"article-title":"Membership inference of diffusion models","year":"2023","author":"Hu","key":"ref20"},{"article-title":"Membership inference attacks on lottery ticket networks","year":"2021","author":"Bagmar","key":"ref21"},{"article-title":"Membership inference attacks against latent factor model","year":"2022","author":"Hu","key":"ref22"},{"article-title":"On the vulnerability of data points under multiple membership inference attacks and target models","year":"2022","author":"Conti","key":"ref23"},{"article-title":"Data origin inference in machine learning","year":"2023","author":"Xu","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3356821"},{"key":"ref26","article-title":"Membership inference attacks on knowledge graphs","author":"Wang","year":"2022","journal-title":"Feb"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/ng.436"},{"journal-title":"risk in machine","year":"\u201cPrivacy","author":"Yeom","key":"ref29"},{"article-title":"Understanding membership inferences on well-generalized learning models","year":"2018","author":"Long","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243855"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICAML57167.2022.00014"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/BF02985802"},{"journal-title":"arXiv:2307.05193","article-title":"Membership inference attacks on DNNs using adversarial perturbations","author":"Ali","key":"ref34"},{"article-title":"An overview of privacy in machine learning","year":"2020","author":"Cristofaro","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417238"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484756"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1037\/e516712004-001"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484575"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_3"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36071-8_33"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/11527503_88"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108650"},{"article-title":"Crypto-nets: Neural networks over encrypted data","year":"2014","author":"Xie","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i1.612"},{"key":"ref48","article-title":"Privacy-preserving logistic regression","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"21","author":"Chaudhuri","year":"2008"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350253"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3534642"},{"key":"ref53","article-title":"Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017","journal-title":"Sep"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.463"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2814575"},{"key":"ref56","article-title":"[PDF] Learning multiple layers of features from tiny images | Semantic Scholar"},{"key":"ref57","first-page":"215","article-title":"An analysis of single-layer networks in unsupervised feature learning","volume-title":"Proc. Fourteenth Int. Conf. Artif. Intell. Statist.","author":"Coates","year":"2011"},{"key":"ref58","article-title":"ML-Doctor:","author":"Liu","year":"2021","journal-title":"Holistic risk assessment of inference attacks against machine"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80023-1"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9326-7"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03664-6"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICAML57167.2022.00014"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9078688\/10841832\/10639374.pdf?arnumber=10639374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T19:00:59Z","timestamp":1764270059000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10639374\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":62,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tai.2024.3445326","relation":{},"ISSN":["2691-4581"],"issn-type":[{"type":"electronic","value":"2691-4581"}],"subject":[],"published":{"date-parts":[[2025,1]]}}}