{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T07:49:58Z","timestamp":1662796198856},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2029038,1350324"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,14]]},"DOI":"10.1145\/3447548.3467445","type":"proceedings-article","created":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T18:21:39Z","timestamp":1628878899000},"source":"Crossref","is-referenced-by-count":2,"title":["PAR-GAN: Improving the Generalization of Generative Adversarial Networks Against Membership Inference Attacks"],"prefix":"10.1145","author":[{"given":"Junjie","family":"Chen","sequence":"first","affiliation":[{"name":"Harbin Institute of Technology & Temple University, Shenzhen, China"}]},{"given":"Wendy Hui","family":"Wang","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"given":"Hongchang","family":"Gao","sequence":"additional","affiliation":[{"name":"Temple University, Philadelphia, PA, USA"}]},{"given":"Xinghua","family":"Shi","sequence":"additional","affiliation":[{"name":"Temple University, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"ProPublica","volume":"23","author":"Angwin Julia","year":"2016","unstructured":"Julia Angwin , Jeff Larson , Surya Mattu , and Lauren Kirchner . 2016 . Machine bias . ProPublica , May , Vol. 23 , 2016 (2016), 139--159. Julia Angwin, Jeff Larson, Surya Mattu, and Lauren Kirchner. 2016. Machine bias. ProPublica, May, Vol. 23, 2016 (2016), 139--159."},{"key":"e_1_3_2_2_2_1","volume-title":"Wasserstein gan. arXiv preprint arXiv:1701.07875","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky , Soumith Chintala , and L\u00e9on Bottou . 2017. Wasserstein gan. arXiv preprint arXiv:1701.07875 ( 2017 ). Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. 2017. Wasserstein gan. arXiv preprint arXiv:1701.07875 (2017)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3305381.3305405"},{"key":"e_1_3_2_2_4_1","volume-title":"Began: Boundary equilibrium generative adversarial networks. arXiv preprint arXiv:1703.10717","author":"Berthelot David","year":"2017","unstructured":"David Berthelot , Thomas Schumm , and Luke Metz . 2017 . Began: Boundary equilibrium generative adversarial networks. arXiv preprint arXiv:1703.10717 (2017). David Berthelot, Thomas Schumm, and Luke Metz. 2017. Began: Boundary equilibrium generative adversarial networks. arXiv preprint arXiv:1703.10717 (2017)."},{"key":"e_1_3_2_2_5_1","volume-title":"Gan-leaks: A taxonomy of membership inference attacks against gans. arXiv preprint arXiv:1909.03935","author":"Chen Dingfan","year":"2019","unstructured":"Dingfan Chen , Ning Yu , Yang Zhang , and Mario Fritz . 2019 . Gan-leaks: A taxonomy of membership inference attacks against gans. arXiv preprint arXiv:1909.03935 (2019). Dingfan Chen, Ning Yu, Yang Zhang, and Mario Fritz. 2019. Gan-leaks: A taxonomy of membership inference attacks against gans. arXiv preprint arXiv:1909.03935 (2019)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_2_7_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014a. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680. Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014a. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680."},{"key":"e_1_3_2_2_8_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014b. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 ( 2014 ). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014b. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_2_9_1","unstructured":"Ishaan Gulrajani Faruk Ahmed Martin Arjovsky Vincent Dumoulin and Aaron C Courville. 2017. Improved training of wasserstein gans. In Advances in neural information processing systems. 5767--5777. Ishaan Gulrajani Faruk Ahmed Martin Arjovsky Vincent Dumoulin and Aaron C Courville. 2017. Improved training of wasserstein gans. In Advances in neural information processing systems. 5767--5777."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2019.00095"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0008"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0067"},{"key":"e_1_3_2_2_13_1","unstructured":"J. Jordon Jinsung Yoon and M. V. D. Schaar. 2019. PATE-GAN: Generating Synthetic Data with Differential Privacy Guarantees. In ICLR . J. Jordon Jinsung Yoon and M. V. D. Schaar. 2019. PATE-GAN: Generating Synthetic Data with Differential Privacy Guarantees. In ICLR ."},{"key":"e_1_3_2_2_14_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_2_15_1","unstructured":"Alex Krizhevsky Geoffrey Hinton etal 2009. Learning multiple layers of features from tiny images. (2009). Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_2_17_1","volume-title":"Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference. arXiv preprint arXiv:1906.11798","author":"Leino Klas","year":"2019","unstructured":"Klas Leino and Matt Fredrikson . 2019 . Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference. arXiv preprint arXiv:1906.11798 (2019). Klas Leino and Matt Fredrikson. 2019. Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference. arXiv preprint arXiv:1906.11798 (2019)."},{"key":"e_1_3_2_2_18_1","volume-title":"ALICE: Towards Understanding Adversarial Learning for Joint Distribution Matching. In NIPS .","author":"Li C.","year":"2017","unstructured":"C. Li , H. Liu , C. Chen , Y. Pu , Liqun Chen , Ricardo Henao , and L. Carin . 2017 . ALICE: Towards Understanding Adversarial Learning for Joint Distribution Matching. In NIPS . C. Li, H. Liu, C. Chen, Y. Pu, Liqun Chen, Ricardo Henao, and L. Carin. 2017. ALICE: Towards Understanding Adversarial Learning for Joint Distribution Matching. In NIPS ."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872695"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2804278"},{"key":"e_1_3_2_2_21_1","volume-title":"Performing Co-membership Attacks Against Deep Generative Models. 2019 IEEE International Conference on Data Mining (ICDM)","author":"Liu Kin Sum","year":"2019","unstructured":"Kin Sum Liu , Chaowei Xiao , Bo Li , and Jiexin Gao . 2019 . Performing Co-membership Attacks Against Deep Generative Models. 2019 IEEE International Conference on Data Mining (ICDM) (2019), 459--467. Kin Sum Liu, Chaowei Xiao, Bo Li, and Jiexin Gao. 2019. Performing Co-membership Attacks Against Deep Generative Models. 2019 IEEE International Conference on Data Mining (ICDM) (2019), 459--467."},{"key":"e_1_3_2_2_22_1","volume-title":"Understanding membership inferences on well-generalized learning models. arXiv preprint arXiv:1802.04889","author":"Long Yunhui","year":"2018","unstructured":"Yunhui Long , Vincent Bindschaedler , Lei Wang , Diyue Bu , Xiaofeng Wang , Haixu Tang , Carl A Gunter , and Kai Chen . 2018. Understanding membership inferences on well-generalized learning models. arXiv preprint arXiv:1802.04889 ( 2018 ). Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A Gunter, and Kai Chen. 2018. Understanding membership inferences on well-generalized learning models. arXiv preprint arXiv:1802.04889 (2018)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.304"},{"key":"e_1_3_2_2_24_1","volume-title":"Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784","author":"Mirza Mehdi","year":"2014","unstructured":"Mehdi Mirza and Simon Osindero . 2014. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784 ( 2014 ). Mehdi Mirza and Simon Osindero. 2014. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784 (2014)."},{"key":"e_1_3_2_2_25_1","volume-title":"Spectral normalization for generative adversarial networks. arXiv preprint arXiv:1802.05957","author":"Miyato Takeru","year":"2018","unstructured":"Takeru Miyato , Toshiki Kataoka , Masanori Koyama , and Yuichi Yoshida . 2018. Spectral normalization for generative adversarial networks. arXiv preprint arXiv:1802.05957 ( 2018 ). Takeru Miyato, Toshiki Kataoka, Masanori Koyama, and Yuichi Yoshida. 2018. Spectral normalization for generative adversarial networks. arXiv preprint arXiv:1802.05957 (2018)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0041"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_2_29_1","unstructured":"Tu Nguyen Trung Le Hung Vu and Dinh Phung. 2017. Dual discriminator generative adversarial nets. In Advances in Neural Information Processing Systems. 2670--2680. Tu Nguyen Trung Le Hung Vu and Dinh Phung. 2017. Dual discriminator generative adversarial nets. In Advances in Neural Information Processing Systems. 2670--2680."},{"key":"e_1_3_2_2_30_1","volume-title":"Semi-supervised learning with generative adversarial networks. arXiv preprint arXiv:1606.01583","author":"Odena Augustus","year":"2016","unstructured":"Augustus Odena . 2016. Semi-supervised learning with generative adversarial networks. arXiv preprint arXiv:1606.01583 ( 2016 ). Augustus Odena. 2016. Semi-supervised learning with generative adversarial networks. arXiv preprint arXiv:1606.01583 (2016)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3305890.3305954"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01265-2"},{"key":"e_1_3_2_2_33_1","volume-title":"Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434","author":"Radford Alec","year":"2015","unstructured":"Alec Radford , Luke Metz , and Soumith Chintala . 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 ( 2015 ). Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)."},{"key":"e_1_3_2_2_34_1","volume-title":"Adversarial generation of natural language. arXiv preprint arXiv:1705.10929","author":"Rajeswar Sai","year":"2017","unstructured":"Sai Rajeswar , Sandeep Subramanian , Francis Dutil , Christopher Pal , and Aaron Courville . 2017. Adversarial generation of natural language. arXiv preprint arXiv:1705.10929 ( 2017 ). Sai Rajeswar, Sandeep Subramanian, Francis Dutil, Christopher Pal, and Aaron Courville. 2017. Adversarial generation of natural language. arXiv preprint arXiv:1705.10929 (2017)."},{"key":"e_1_3_2_2_35_1","volume-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246","author":"Salem Ahmed","year":"2018","unstructured":"Ahmed Salem , Yang Zhang , Mathias Humbert , Pascal Berrang , Mario Fritz , and Michael Backes . 2018 . Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246 (2018). Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2018. Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246 (2018)."},{"key":"e_1_3_2_2_36_1","unstructured":"Ali Shafahi W Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. In Advances in Neural Information Processing Systems. 6103--6113. Ali Shafahi W Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. In Advances in Neural Information Processing Systems. 6103--6113."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00021"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00018"},{"key":"e_1_3_2_2_40_1","volume-title":"Lei Yu, and Wenqi Wei.","author":"Truex Stacey","year":"2019","unstructured":"Stacey Truex , Ling Liu , Mehmet Emre Gursoy , Lei Yu, and Wenqi Wei. 2019 . Demystifying membership inference attacks in machine learning as a service. IEEE Transactions on Services Computing ( 2019). Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu, and Wenqi Wei. 2019. Demystifying membership inference attacks in machine learning as a service. IEEE Transactions on Services Computing (2019)."},{"key":"e_1_3_2_2_41_1","unstructured":"Bingzhe Wu Shiwan Zhao Chaochao Chen Haoyang Xu Li Wang Xiaolu Zhang Guangyu Sun and Jun Zhou. 2019. Generalization in generative adversarial networks: A novel perspective from privacy protection. In Advances in Neural Information Processing Systems. 307--317. Bingzhe Wu Shiwan Zhao Chaochao Chen Haoyang Xu Li Wang Xiaolu Zhang Guangyu Sun and Jun Zhou. 2019. Generalization in generative adversarial networks: A novel perspective from privacy protection. In Advances in Neural Information Processing Systems. 307--317."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.629"},{"key":"e_1_3_2_2_44_1","volume-title":"Energy-based generative adversarial network. arXiv preprint arXiv:1609.03126","author":"Zhao Junbo","year":"2016","unstructured":"Junbo Zhao , Michael Mathieu , and Yann LeCun . 2016. Energy-based generative adversarial network. arXiv preprint arXiv:1609.03126 ( 2016 ). Junbo Zhao, Michael Mathieu, and Yann LeCun. 2016. Energy-based generative adversarial network. arXiv preprint arXiv:1609.03126 (2016)."}],"event":{"name":"KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Virtual Event Singapore","acronym":"KDD '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447548.3467445","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447548.3467445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T11:52:13Z","timestamp":1660477933000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467445"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,14]]},"references-count":44,"alternative-id":["10.1145\/3447548.3467445","10.1145\/3447548"],"URL":"http:\/\/dx.doi.org\/10.1145\/3447548.3467445","relation":{},"published":{"date-parts":[[2021,8,14]]}}}