{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:32:59Z","timestamp":1773246779495,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Jiangsu Provincial Key Laboratory of Network and Information Security","award":["No. BM2003201"],"award-info":[{"award-number":["No. BM2003201"]}]},{"name":"Australian Research Council (ARC) Discovery Project","award":["DP210102670"],"award-info":[{"award-number":["DP210102670"]}]},{"name":"The Research Center for Cyber Security at Tel Aviv University established by the State of Israel"},{"name":"The Prime Minister's Office"},{"name":"Tel Aviv University"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485251","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"2096-2112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing"],"prefix":"10.1145","author":[{"given":"Aoting","family":"Hu","sequence":"first","affiliation":[{"name":"Southeast University, Jiangsu, China"}]},{"given":"Renjie","family":"Xie","sequence":"additional","affiliation":[{"name":"Southeast University, Jiangsu, China"}]},{"given":"Zhigang","family":"Lu","sequence":"additional","affiliation":[{"name":"Macquarie University, Macquarie Park, NSW, Australia"}]},{"given":"Aiqun","family":"Hu","sequence":"additional","affiliation":[{"name":"Southeast University, Jiangsu, China"}]},{"given":"Minhui","family":"Xue","sequence":"additional","affiliation":[{"name":"The University of Adelaide, Adelaide, SA, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of Machine Learning Research","volume":"70","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. 2017. Wasserstein Generative Adversarial Networks. In Proceedings of Machine Learning Research, Vol. 70. PMLR, Sydney, Australia, 214--223."},{"key":"e_1_3_2_1_3_1","volume-title":"ProPublica's COMPAS Data Revisited. arXiv:1906.04711 [cs, econ, q-fin, stat] (July","author":"Barenstein Matias","year":"2019","unstructured":"Matias Barenstein. 2019. ProPublica's COMPAS Data Revisited. arXiv:1906.04711 [cs, econ, q-fin, stat] (July 2019). http:\/\/arxiv.org\/abs\/1906.04711"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2450142.2450148"},{"key":"e_1_3_2_1_5_1","unstructured":"Sala Carles. 2019. SDGym Project. https:\/\/github.com\/sdv-dev\/SDGym"},{"key":"e_1_3_2_1_6_1","volume-title":"The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Carlini Nicholas","year":"2019","unstructured":"Nicholas Carlini, Chang Liu, \u00dalfar Erlingsson, Jernej Kos, and Dawn Song. 2019. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 267--284."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417238"},{"key":"e_1_3_2_1_8_1","volume-title":"Differentially private data generative models. arXiv preprint arXiv:1812.02274","author":"Chen Qingrong","year":"2018","unstructured":"Qingrong Chen, Chong Xiang, Minhui Xue, Bo Li, Nikita Borisov, Dali Kaarfar, and Haojin Zhu. 2018. Differentially private data generative models. arXiv preprint arXiv:1812.02274 (2018)."},{"key":"e_1_3_2_1_9_1","volume-title":"Label-Only Membership Inference Attacks. arxiv","author":"Choquette Choo Christopher A.","year":"2007","unstructured":"Christopher A. Choquette Choo, Florian Tramer, Nicholas Carlini, and Nicolas Papernot. 2020. Label-Only Membership Inference Attacks. arxiv: 2007.14321 [cs.CR]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"e_1_3_2_1_11_1","volume-title":"2006 a. Our Data","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. 2006 a. Our Data, Ourselves: Privacy Via Distributed Noise Generation. In Advances in Cryptology - EUROCRYPT 2006, Vol. 4004. Springer Berlin Heidelberg, Berlin, Heidelberg, 486--503."},{"key":"e_1_3_2_1_12_1","volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006 b. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_3_2_1_13_1","volume-title":"Foundations and Trends\u00ae in Theoretical Computer Science","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407."},{"key":"e_1_3_2_1_14_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680."},{"key":"e_1_3_2_1_15_1","unstructured":"Ishaan Gulrajani Faruk Ahmed Martin Arjovsky Vincent Dumoulin and Aaron C Courville. 2017. Improved Training of Wasserstein GANs. In Advances in Neural Information Processing Systems (NDSS). 5767--5777."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1137\/110857714"},{"key":"e_1_3_2_1_17_1","volume-title":"Theory of Cryptography","author":"Gupta Anupam","unstructured":"Anupam Gupta, Aaron Roth, and Jonathan Ullman. 2012. Iterative Constructions and Private Data Release. In Theory of Cryptography, Vol. 7194. Springer Berlin Heidelberg, Berlin, Heidelberg, 339--356."},{"key":"e_1_3_2_1_18_1","unstructured":"Moritz Hardt Katrina Ligett and Frank Mcsherry. 2012. A Simple and Practical Algorithm for Differentially Private Data Release. In Advances in Neural Information Processing Systems 25. 2339--2347."},{"key":"e_1_3_2_1_19_1","volume-title":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","author":"Hardt Moritz","unstructured":"Moritz Hardt and Guy N. Rothblum. 2010. A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis. In 2010 IEEE 51st Annual Symposium on Foundations of Computer Science (Las Vegas, NV, USA). 61--70."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0008"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0067"},{"key":"e_1_3_2_1_22_1","unstructured":"Larson Jeff Roswell Marjorie and Atlidakis Vaggelis. 2017. Compas Dataset. https:\/\/github.com\/propublica\/compas-analysis"},{"key":"e_1_3_2_1_23_1","volume-title":"Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114","author":"Kingma Diederik P","year":"2013","unstructured":"Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516686"},{"key":"e_1_3_2_1_26_1","volume-title":"Membership Leakage in Label-Only Exposures. arXiv preprint arXiv:2007.15528","author":"Li Zheng","year":"2020","unstructured":"Zheng Li and Yang Zhang. 2020. Membership Leakage in Label-Only Exposures. arXiv preprint arXiv:2007.15528 (2020)."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of The 24th International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research","volume":"1530","author":"Lin Zinan","year":"2021","unstructured":"Zinan Lin, Vyas Sekar, and Giulia Fanti. 2021. On the Privacy Properties of GAN-generated Samples. In Proceedings of The 24th International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research, Vol. 130), Arindam Banerjee and Kenji Fukumizu (Eds.). PMLR, 1522--1530. http:\/\/proceedings.mlr.press\/v130\/lin21b.html"},{"key":"e_1_3_2_1_28_1","volume-title":"Understanding Membership Inferences on Well-Generalized Learning Models. arxiv","author":"Long Yunhui","year":"1802","unstructured":"Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, and Kai Chen. 2018. Understanding Membership Inferences on Well-Generalized Learning Models. arxiv: 1802.04889 [cs.CR]"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_30_1","volume-title":"A general approach to adding differential privacy to iterative training procedures. arXiv preprint arXiv:1812.06210","author":"McMahan H Brendan","year":"2018","unstructured":"H Brendan McMahan, Galen Andrew, Ulfar Erlingsson, Steve Chien, Ilya Mironov, Nicolas Papernot, and Peter Kairouz. 2018. A general approach to adding differential privacy to iterative training procedures. arXiv preprint arXiv:1812.06210 (2018)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_34_1","unstructured":"The Guardian Online. 2017. The Guardian view on Google's NHS grab: legally inappropriate. https:\/\/www.theguardian.com\/commentisfree\/2017\/may\/17\/the-guardian-view-on-googles-nhs-grab-legally-inappropriate"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14778\/3231751.3231757"},{"key":"e_1_3_2_1_36_1","unstructured":"Atiqur Rahman Tanzila Rahman Robert Laganiere Noman Mohammed and Yang Wang. 2018. Membership Inference Attack against Differentially Private Deep Learning Model. (2018)."},{"key":"e_1_3_2_1_37_1","volume-title":"On Wasserstein Two Sample Testing and Related Families of Nonparametric Tests. arXiv:1509.02237 [math, stat]","author":"Ramdas Aaditya","year":"2015","unstructured":"Aaditya Ramdas, Nicolas Garcia, and Marco Cuturi. 2015. On Wasserstein Two Sample Testing and Related Families of Nonparametric Tests. arXiv:1509.02237 [math, stat] (2015). http:\/\/arxiv.org\/abs\/1509.02237"},{"key":"e_1_3_2_1_38_1","unstructured":"Sander Richard Knaplund Kris and Winter Kit. [n.d.]. Law School Admissions. http:\/\/www.seaphe.org\/databases\/FOIA\/lawschs1_1.dta"},{"key":"e_1_3_2_1_39_1","unstructured":"Kohavi Ronny and Becker Barry. 1996. UCI Machine Learning Repository. https:\/\/archive.ics.uci.edu\/ml\/datasets\/Adult"},{"key":"e_1_3_2_1_40_1","volume-title":"Learning Certified Individually Fair Representations. arXiv:2002.10312 [cs, stat] (Feb","author":"Ruoss Anian","year":"2020","unstructured":"Anian Ruoss, Mislav Balunovi?, Marc Fischer, and Martin Vechev. 2020. Learning Certified Individually Fair Representations. arXiv:2002.10312 [cs, stat] (Feb. 2020). http:\/\/arxiv.org\/abs\/2002.10312 arXiv: 2002.10312."},{"key":"e_1_3_2_1_41_1","first-page":"5558","article-title":"White-box vs Black-box: Bayes Optimal Strategies for Membership Inference","volume":"97","author":"Sablayrolles Alexandre","year":"2019","unstructured":"Alexandre Sablayrolles, Matthijs Douze, Cordelia Schmid, Yann Ollivier, and Herve Jegou. 2019. White-box vs Black-box: Bayes Optimal Strategies for Membership Inference. In Proceedings of Machine Learning Research (PMLR), Vol. 97. 5558--5567.","journal-title":"Proceedings of Machine Learning Research (PMLR)"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23119"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_44_1","unstructured":"Theresa Stadler Bristena Oprisanu and Carmela Troncoso. 2020. Synthetic Data -- A Privacy Mirage. (2020)."},{"key":"e_1_3_2_1_45_1","first-page":"05","article-title":"k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY","volume":"10","author":"Sweeney Latanya","year":"2002","unstructured":"Latanya Sweeney. 2002. k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY. Int. J. Unc. Fuzz. Knowl. Based Syst., Vol. 10, 05 (Oct. 2002), 557--570.","journal-title":"Int. J. Unc. Fuzz. Knowl. Based Syst."},{"key":"e_1_3_2_1_46_1","unstructured":"Lei Xu Maria Skoularidou Alfredo Cuesta-Infante and Kalyan Veeramachaneni. 2019. Modeling tabular data using conditional gan. In Advances in Neural Information Processing Systems (NISP). 7333--7343."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485251","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:54:26Z","timestamp":1763499266000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485251"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":47,"alternative-id":["10.1145\/3460120.3485251","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485251","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}