{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:13Z","timestamp":1750220653448,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427282","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"116-128","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards Realistic Membership Inferences: The Case of Survey Data"],"prefix":"10.1145","author":[{"given":"Luke A.","family":"Bauer","sequence":"first","affiliation":[{"name":"University of Florida, United States of America"}]},{"given":"Vincent","family":"Bindschaedler","sequence":"additional","affiliation":[{"name":"University of Florida, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978355"},{"key":"e_1_3_2_1_2_1","unstructured":"Eugene Bagdasaryan Omid Poursaeed and Vitaly Shmatikov. 2019. Differential privacy has disparate impact on model accuracy. In Advances in Neural Information Processing Systems. 15453\u201315462.  Eugene Bagdasaryan Omid Poursaeed and Vitaly Shmatikov. 2019. Differential privacy has disparate impact on model accuracy. In Advances in Neural Information Processing Systems. 15453\u201315462."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.54"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700447"},{"volume-title":"Elements of information theory","author":"Cover M","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706788"},{"key":"e_1_3_2_1_7_1","unstructured":"CDC Division of\u00a0Cancer Preventionand Control. 2019. United States Cancer Statistics (USCS). https:\/\/www.cdc.gov\/cancer\/uscs\/technical_notes\/stat_methods\/suppression.htm.  CDC Division of\u00a0Cancer Preventionand Control. 2019. United States Cancer Statistics (USCS). https:\/\/www.cdc.gov\/cancer\/uscs\/technical_notes\/stat_methods\/suppression.htm."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_10_1","first-page":"3","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"e_1_3_2_1_11_1","unstructured":"Cynthia Dwork and Guy\u00a0N. Rothblum. 2016. Concentrated Differential Privacy. CoRR abs\/1603.01887(2016). arxiv:1603.01887http:\/\/arxiv.org\/abs\/1603.01887  Cynthia Dwork and Guy\u00a0N. Rothblum. 2016. Concentrated Differential Privacy. CoRR abs\/1603.01887(2016). arxiv:1603.01887http:\/\/arxiv.org\/abs\/1603.01887"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1097\/MPA.0b013e3180cac24b"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2011.140"},{"key":"e_1_3_2_1_14_1","unstructured":"For\u00a0the Rrecord. [n.d.]. Coding for Peripheral Artery Disease. https:\/\/www.fortherecordmag.com\/archives\/101110p28.shtml.  For\u00a0the Rrecord. [n.d.]. Coding for Peripheral Artery Disease. https:\/\/www.fortherecordmag.com\/archives\/101110p28.shtml."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_28"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0008"},{"key":"e_1_3_2_1_17_1","unstructured":"HCUP. [n.d.]. Appendix A - Clinical Classification Software-DIAGNOSES. https:\/\/www.hcup-us.ahrq.gov\/toolssoftware\/ccs\/AppendixASingleDX.txt.  HCUP. [n.d.]. Appendix A - Clinical Classification Software-DIAGNOSES. https:\/\/www.hcup-us.ahrq.gov\/toolssoftware\/ccs\/AppendixASingleDX.txt."},{"key":"e_1_3_2_1_18_1","unstructured":"Healthcare Cost and Utilization Project (HCUP). 2019. HCUP Nationwide Inpatient Sample (NIS). https:\/\/www.hcup-us.ahrq.gov\/nisoverview.jsp.  Healthcare Cost and Utilization Project (HCUP). 2019. HCUP Nationwide Inpatient Sample (NIS). https:\/\/www.hcup-us.ahrq.gov\/nisoverview.jsp."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2106\/00004623-200309000-00017"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516707"},{"volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19). 1895\u20131912.","author":"Jayaraman Bargav","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"Bargav Jayaraman Lingxiao Wang David Evans and Quanquan Gu. 2020. Revisiting Membership Inference Under Realistic Assumptions. arXiv preprint arXiv:2005.10881(2020).  Bargav Jayaraman Lingxiao Wang David Evans and Quanquan Gu. 2020. Revisiting Membership Inference Under Realistic Assumptions. arXiv preprint arXiv:2005.10881(2020)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487687"},{"volume-title":"On information and sufficiency. The annals of mathematical statistics 22, 1","year":"1951","author":"Kullback Solomon","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3111\/13696998.2014.885907"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339695"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/1358863X14565373"},{"key":"e_1_3_2_1_29_1","unstructured":"Yunhui Long Vincent Bindschaedler Lei Wang Diyue Bu Xiaofeng Wang Haixu Tang Carl\u00a0A. Gunter and Kai Chen. 2018. Understanding Membership Inferences on Well-Generalized Learning Models. CoRR abs\/1802.04889(2018). arxiv:1802.04889http:\/\/arxiv.org\/abs\/1802.04889  Yunhui Long Vincent Bindschaedler Lei Wang Diyue Bu Xiaofeng Wang Haixu Tang Carl\u00a0A. Gunter and Kai Chen. 2018. Understanding Membership Inferences on Well-Generalized Learning Models. CoRR abs\/1802.04889(2018). arxiv:1802.04889http:\/\/arxiv.org\/abs\/1802.04889"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00040"},{"volume-title":"Theory of Cryptography","author":"Lui Edward","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243855"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.athoracsur.2011.06.054"},{"volume-title":"Association between tuberculosis and diabetes in the Mexican border and non-border regions of Texas. The American journal of tropical medicine and hygiene 74, 4","year":"2006","author":"Perez Adriana","key":"e_1_3_2_1_35_1"},{"volume-title":"Knock knock, who\u2019s there? Membership inference on aggregate location data. NDSS","year":"2018","author":"Pyrgelis Apostolos","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","unstructured":"Apostolos Pyrgelis Carmela Troncoso and Emiliano De\u00a0Cristofaro. 2019. Under the Hood of Membership Inference Attacks on Aggregate Location Time-Series. arXiv preprint arXiv:1902.07456(2019).  Apostolos Pyrgelis Carmela Troncoso and Emiliano De\u00a0Cristofaro. 2019. Under the Hood of Membership Inference Attacks on Aggregate Location Time-Series. arXiv preprint arXiv:1902.07456(2019)."},{"key":"e_1_3_2_1_38_1","unstructured":"Rhode Island Department of Health. 2016. Rhode Island Small Numbers Reporting Policy. https:\/\/health.ri.gov\/publications\/policies\/SmallNumbersReporting.pdf.  Rhode Island Department of Health. 2016. Rhode Island Small Numbers Reporting Policy. https:\/\/health.ri.gov\/publications\/policies\/SmallNumbersReporting.pdf."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1097\/SLA.0b013e318185e1b3"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1353\/hpu.2018.0058"},{"volume-title":"ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In Network and Distributed Systems Security Symposium","year":"2019","author":"Salem Ahmed","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1038\/ng.436"},{"volume-title":"The AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI). AAAI, Vol.\u00a013","year":"2020","author":"Shokri Reza","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"volume-title":"Direct medical costs of syncope-related hospitalizations in the United States. The American journal of cardiology 95, 5","year":"2005","author":"Sun C","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","unstructured":"Texas Health Care Information\u00a0Collection (THCIC). 2020. Texas Inpatient Public Use Data File (PUDF). https:\/\/www.dshs.texas.gov\/thcic\/hospitals\/Inpatientpudf.shtm.  Texas Health Care Information\u00a0Collection (THCIC). 2020. Texas Inpatient Public Use Data File (PUDF). https:\/\/www.dshs.texas.gov\/thcic\/hospitals\/Inpatientpudf.shtm."},{"key":"e_1_3_2_1_47_1","unstructured":"Stacey Truex Ling Liu Mehmet\u00a0Emre Gursoy Lei Yu and Wenqi Wei. 2018. Towards Demystifying Membership Inference Attacks. CoRR abs\/1807.09173(2018). arxiv:1807.09173http:\/\/arxiv.org\/abs\/1807.09173  Stacey Truex Ling Liu Mehmet\u00a0Emre Gursoy Lei Yu and Wenqi Wei. 2018. Towards Demystifying Membership Inference Attacks. CoRR abs\/1807.09173(2018). arxiv:1807.09173http:\/\/arxiv.org\/abs\/1807.09173"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1002\/jmri.25100"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653726"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177728852"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094428105280059"},{"key":"e_1_3_2_1_52_1","unstructured":"Mohammad Yaghini Bogdan Kulynych and Carmela Troncoso. 2019. Disparate Vulnerability: on the Unfairness of Privacy Attacks Against Machine Learning. arXiv preprint arXiv:1906.00389(2019).  Mohammad Yaghini Bogdan Kulynych and Carmela Troncoso. 2019. Disparate Vulnerability: on the Unfairness of Privacy Attacks Against Machine Learning. arXiv preprint arXiv:1906.00389(2019)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.01.008"},{"key":"e_1_3_2_1_55_1","unstructured":"Bo Zhang Ruotong Yu Haipei Sun Yanying Li Jun Xu and Hui Wang. 2020. Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack. arXiv preprint arXiv:2001.08855(2020).  Bo Zhang Ruotong Yu Haipei Sun Yanying Li Jun Xu and Hui Wang. 2020. Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack. arXiv preprint arXiv:2001.08855(2020)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_33"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427282","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427282"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":56,"alternative-id":["10.1145\/3427228.3427282","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427282","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}