{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:31:55Z","timestamp":1740169915449,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Automatic Implementation of Secure Silicon Program","award":["HR0011-20-F-0045"],"award-info":[{"award-number":["HR0011-20-F-0045"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2022,10,1]]},"DOI":"10.1109\/tetc.2022.3179980","type":"journal-article","created":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T20:31:58Z","timestamp":1654806718000},"page":"1733-1745","source":"Crossref","is-referenced-by-count":1,"title":["An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6143-9787","authenticated-orcid":false,"given":"Qian","family":"Xu","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering Department, University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5179-5216","authenticated-orcid":false,"given":"Md Tanvir","family":"Arafin","sequence":"additional","affiliation":[{"name":"ECE Department, Morgan State University, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6759-8949","authenticated-orcid":false,"given":"Gang","family":"Qu","sequence":"additional","affiliation":[{"name":"ECE and ISR, University of Maryland, College Park, MD, USA"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/ICMLA51294.2020.00183"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1038\/s41592-018-0111-2"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ISSCC.2014.6757351"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/JSSC.2016.2636225"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/2485922.2485955"},{"year":"0","key":"ref30"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/ICCV.2015.425"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/ICIP.2014.7025068"},{"year":"2021","author":"titcombe","article-title":"Practical defences against model inversion attacks for split neural networks","key":"ref35"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/TCAD.2020.2992527"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-642-14452-3_1"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/CVPR.2015.7299155"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/s11263-016-0911-8"},{"key":"ref13","first-page":"3395","article-title":"Synthesizing the preferred inputs for neurons in neural networks via deep generator networks","author":"nguyen","year":"2016","journal-title":"Proc 30th Int Conf Neural Inf Process Syst"},{"year":"2019","author":"santurkar","article-title":"Image synthesis with a single (robust) classifier","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/3319535.3354261"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/3299874.3319457"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/BigData50022.2020.9378274"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/DATE.2011.5763153"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.23919\/DATE.2017.7927036"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3307650.3322231"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/CVPR42600.2020.00033"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/2749469.2750419"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/2810103.2813677"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICCAD.2015.7372561"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/1229175.1229176"},{"key":"ref5","first-page":"17","article-title":"Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing","author":"fredrikson","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ASPDAC.2017.7858345"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/3060403.3060455"},{"year":"2001","author":"friedman","journal-title":"The Elements of Statistical Learning","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.18080\/jtde.v2n3.285"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/j.vlsi.2018.04.008"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3140659.3080242"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/3084447"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3352460.3358280"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TC.2016.2640296"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/HPCA.2018.00026"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2897937.2905002"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/9970409\/09792582.pdf?arnumber=9792582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:14:23Z","timestamp":1672082063000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9792582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":39,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2022.3179980","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"type":"electronic","value":"2168-6750"},{"type":"electronic","value":"2376-4562"}],"subject":[],"published":{"date-parts":[[2022,10,1]]}}}