{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:18:27Z","timestamp":1751606307992,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2018R1A2B3001628"],"award-info":[{"award-number":["2018R1A2B3001628"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3497772","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"364-376","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Membership Feature Disentanglement Network"],"prefix":"10.1145","author":[{"given":"Heonseok","family":"Ha","sequence":"first","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"given":"Jaehee","family":"Jang","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"given":"Yonghyun","family":"Jeong","sequence":"additional","affiliation":[{"name":"Samsung SDS, Seoul, South Korea"}]},{"given":"Sungroh","family":"Yoon","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978355"},{"key":"e_1_3_2_2_2_1","volume-title":"Assessing Differentially Private Deep Learning with Membership Inference. arXiv preprint arXiv:1912.11328","author":"Bernau Daniel","year":"2019","unstructured":"Daniel Bernau , Philip-William Grassal , Jonas Robl , and Florian Kerschbaum . 2019. Assessing Differentially Private Deep Learning with Membership Inference. arXiv preprint arXiv:1912.11328 ( 2019 ). Daniel Bernau, Philip-William Grassal, Jonas Robl, and Florian Kerschbaum. 2019. Assessing Differentially Private Deep Learning with Membership Inference. arXiv preprint arXiv:1912.11328 (2019)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417238"},{"key":"e_1_3_2_2_4_1","volume-title":"Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data. In BIOCOMPUTING 2021: Proceedings of the Pacific Symposium. World Scientific, 26--37","author":"Chen Junjie","year":"2020","unstructured":"Junjie Chen , Wendy Hui Wang , and Xinghua Shi . 2020 a . Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data. In BIOCOMPUTING 2021: Proceedings of the Pacific Symposium. World Scientific, 26--37 . Junjie Chen, Wendy Hui Wang, and Xinghua Shi. 2020 a. Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data. In BIOCOMPUTING 2021: Proceedings of the Pacific Symposium. World Scientific, 26--37."},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the 32nd International Conference on Neural Information Processing Systems. 2615--2625","author":"Chen Ricky TQ","year":"2018","unstructured":"Ricky TQ Chen , Xuechen Li , Roger Grosse , and David Duvenaud . 2018 . Isolating Sources of Disentanglement in VAEs . In Proceedings of the 32nd International Conference on Neural Information Processing Systems. 2615--2625 . Ricky TQ Chen, Xuechen Li, Roger Grosse, and David Duvenaud. 2018. Isolating Sources of Disentanglement in VAEs. In Proceedings of the 32nd International Conference on Neural Information Processing Systems. 2615--2625."},{"key":"e_1_3_2_2_6_1","volume-title":"Label-Only Membership Inference Attacks. In International Conference on Machine Learning. PMLR","author":"Choquette-Choo Christopher A","year":"2021","unstructured":"Christopher A Choquette-Choo , Florian Tramer , Nicholas Carlini , and Nicolas Papernot . 2021 . Label-Only Membership Inference Attacks. In International Conference on Machine Learning. PMLR , 1964--1974. Christopher A Choquette-Choo, Florian Tramer, Nicholas Carlini, and Nicolas Papernot. 2021. Label-Only Membership Inference Attacks. In International Conference on Machine Learning. PMLR, 1964--1974."},{"key":"e_1_3_2_2_7_1","volume-title":"Differential Privacy: A Survey of Results. In International conference on theory and applications of models of computation. Springer, 1--19","author":"Dwork Cynthia","year":"2008","unstructured":"Cynthia Dwork . 2008 . Differential Privacy: A Survey of Results. In International conference on theory and applications of models of computation. Springer, 1--19 . Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. In International conference on theory and applications of models of computation. Springer, 1--19."},{"key":"e_1_3_2_2_8_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in neural information processing systems. 2672--2680.  Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in neural information processing systems. 2672--2680."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0008"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_11_1","volume-title":"Segmentations-Leak: Membership Inference Attacks and Defenses in Semantic Image Segmentation. In European Conference on Computer Vision. Springer, 519--535","author":"He Yang","year":"2020","unstructured":"Yang He , Shadi Rahimian , Bernt Schiele , and Mario Fritz . 2020 . Segmentations-Leak: Membership Inference Attacks and Defenses in Semantic Image Segmentation. In European Conference on Computer Vision. Springer, 519--535 . Yang He, Shadi Rahimian, Bernt Schiele, and Mario Fritz. 2020. Segmentations-Leak: Membership Inference Attacks and Defenses in Semantic Image Segmentation. In European Conference on Computer Vision. Springer, 519--535."},{"key":"e_1_3_2_2_12_1","volume-title":"Advances in Neural Information Processing Systems","volume":"33","author":"Hermann Katherine","year":"2020","unstructured":"Katherine Hermann and Andrew Lampinen . 2020 . What shapes feature representations? Exploring datasets, architectures, and training . Advances in Neural Information Processing Systems , Vol. 33 (2020). Katherine Hermann and Andrew Lampinen. 2020. What shapes feature representations? Exploring datasets, architectures, and training. Advances in Neural Information Processing Systems, Vol. 33 (2020)."},{"key":"e_1_3_2_2_13_1","volume-title":"TransMIA: Membership Inference Attacks Using Transfer Shadow Training. In 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 1--10","author":"Hidano Seira","year":"2021","unstructured":"Seira Hidano , Takao Murakami , and Yusuke Kawamoto . 2021 . TransMIA: Membership Inference Attacks Using Transfer Shadow Training. In 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 1--10 . Seira Hidano, Takao Murakami, and Yusuke Kawamoto. 2021. TransMIA: Membership Inference Attacks Using Transfer Shadow Training. In 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 1--10."},{"key":"e_1_3_2_2_14_1","volume-title":"International Conference on Learning Representations.","author":"Higgins Irina","year":"2017","unstructured":"Irina Higgins , Lo\u00efc Matthey , Arka Pal , Christopher P. Burgess , Xavier Glorot , Matthew M. Botvinick , Shakir Mohamed , and Alexander Lerchner . 2017 . beta-VAE: Learning Basic Visual Concepts with a Constrained Variational Framework . In International Conference on Learning Representations. Irina Higgins, Lo\u00efc Matthey, Arka Pal, Christopher P. Burgess, Xavier Glorot, Matthew M. Botvinick, Shakir Mohamed, and Alexander Lerchner. 2017. beta-VAE: Learning Basic Visual Concepts with a Constrained Variational Framework. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0067"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00299"},{"key":"e_1_3_2_2_17_1","volume-title":"Membership Inference Attacks on Machine Learning: A Survey. arXiv preprint arXiv:2103.07853","author":"Hu Hongsheng","year":"2021","unstructured":"Hongsheng Hu , Zoran Salcic , Gillian Dobbie , and Xuyun Zhang . 2021. Membership Inference Attacks on Machine Learning: A Survey. arXiv preprint arXiv:2103.07853 ( 2021 ). Hongsheng Hu, Zoran Salcic, Gillian Dobbie, and Xuyun Zhang. 2021. Membership Inference Attacks on Machine Learning: A Survey. arXiv preprint arXiv:2103.07853 (2021)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2021.95007"},{"key":"e_1_3_2_2_19_1","volume-title":"Demystifying the Membership Inference Attack. In 2019 12th CMI Conference on Cybersecurity and Privacy (CMI). IEEE, 1--7.","author":"Irolla Paul","year":"2019","unstructured":"Paul Irolla and Gr\u00e9gory Ch\u00e2tel . 2019 . Demystifying the Membership Inference Attack. In 2019 12th CMI Conference on Cybersecurity and Privacy (CMI). IEEE, 1--7. Paul Irolla and Gr\u00e9gory Ch\u00e2tel. 2019. Demystifying the Membership Inference Attack. In 2019 12th CMI Conference on Cybersecurity and Privacy (CMI). IEEE, 1--7."},{"key":"e_1_3_2_2_20_1","volume-title":"Bhanu Pratap Singh Rawat, and Hong Yu","author":"Jagannatha Abhyuday","year":"2021","unstructured":"Abhyuday Jagannatha , Bhanu Pratap Singh Rawat, and Hong Yu . 2021 . Membership Inference Attack Susceptibility of Clinical Language Models . arXiv preprint arXiv:2104.08305 (2021). Abhyuday Jagannatha, Bhanu Pratap Singh Rawat, and Hong Yu. 2021. Membership Inference Attack Susceptibility of Clinical Language Models. arXiv preprint arXiv:2104.08305 (2021)."},{"key":"e_1_3_2_2_21_1","volume-title":"Revisiting Membership Inference Under Realistic Assumptions. arXiv preprint arXiv:2005.10881","author":"Jayaraman Bargav","year":"2020","unstructured":"Bargav Jayaraman , Lingxiao Wang , Katherine Knipmeyer , Quanquan Gu , and David Evans . 2020. Revisiting Membership Inference Under Realistic Assumptions. arXiv preprint arXiv:2005.10881 ( 2020 ). Bargav Jayaraman, Lingxiao Wang, Katherine Knipmeyer, Quanquan Gu, and David Evans. 2020. Revisiting Membership Inference Under Realistic Assumptions. arXiv preprint arXiv:2005.10881 (2020)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363201"},{"key":"e_1_3_2_2_23_1","volume-title":"International Conference on Machine Learning. PMLR, 5345--5355","author":"Kaya Yigitcan","year":"2021","unstructured":"Yigitcan Kaya and Tudor Dumitras . 2021 . When Does Data Augmentation Help With Membership Inference Attacks? . In International Conference on Machine Learning. PMLR, 5345--5355 . Yigitcan Kaya and Tudor Dumitras. 2021. When Does Data Augmentation Help With Membership Inference Attacks?. In International Conference on Machine Learning. PMLR, 5345--5355."},{"key":"e_1_3_2_2_24_1","volume-title":"International Conference on Machine Learning. PMLR, 2649--2658","author":"Kim Hyunjik","year":"2018","unstructured":"Hyunjik Kim and Andriy Mnih . 2018 . Disentangling by Factorising . In International Conference on Machine Learning. PMLR, 2649--2658 . Hyunjik Kim and Andriy Mnih. 2018. Disentangling by Factorising. In International Conference on Machine Learning. PMLR, 2649--2658."},{"key":"e_1_3_2_2_25_1","volume-title":"Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Leino Klas","year":"2020","unstructured":"Klas Leino and Matt Fredrikson . 2020 . Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference. In 29th USENIX Security Symposium (USENIX Security 20) . 1605--1622. Klas Leino and Matt Fredrikson. 2020. Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference. In 29th USENIX Security Symposium (USENIX Security 20). 1605--1622."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3447836"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484575"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2916086"},{"key":"e_1_3_2_2_29_1","first-page":"14611","article-title":"On the Fairness of Disentangled Representations","volume":"32","author":"Locatello Francesco","year":"2019","unstructured":"Francesco Locatello , Gabriele Abbati , Thomas Rainforth , Stefan Bauer , Bernhard Sch\u00f6lkopf , and Olivier Bachem . 2019 . On the Fairness of Disentangled Representations . Advances in Neural Information Processing Systems , Vol. 32 (2019), 14611 -- 14624 . Francesco Locatello, Gabriele Abbati, Thomas Rainforth, Stefan Bauer, Bernhard Sch\u00f6lkopf, and Olivier Bachem. 2019. On the Fairness of Disentangled Representations. Advances in Neural Information Processing Systems, Vol. 32 (2019), 14611--14624.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_30_1","volume-title":"Sharing Models or Coresets: A Study based on Membership Inference Attack. arXiv preprint arXiv:2007.02977","author":"Lu Hanlin","year":"2020","unstructured":"Hanlin Lu , Changchang Liu , Ting He , Shiqiang Wang , and Kevin S Chan . 2020. Sharing Models or Coresets: A Study based on Membership Inference Attack. arXiv preprint arXiv:2007.02977 ( 2020 ). Hanlin Lu, Changchang Liu, Ting He, Shiqiang Wang, and Kevin S Chan. 2020. Sharing Models or Coresets: A Study based on Membership Inference Attack. arXiv preprint arXiv:2007.02977 (2020)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243855"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_2_33_1","volume-title":"Membership Inference Attack on Graph Neural Networks. arXiv preprint arXiv:2101.06570","author":"Olatunji Iyiola E","year":"2021","unstructured":"Iyiola E Olatunji , Wolfgang Nejdl , and Megha Khosla . 2021. Membership Inference Attack on Graph Neural Networks. arXiv preprint arXiv:2101.06570 ( 2021 ). Iyiola E Olatunji, Wolfgang Nejdl, and Megha Khosla. 2021. Membership Inference Attack on Graph Neural Networks. arXiv preprint arXiv:2101.06570 (2021)."},{"key":"e_1_3_2_2_34_1","volume-title":"Membership Inference Attacks Against Object Detection Models. arXiv preprint arXiv:2001.04011","author":"Park Yeachan","year":"2020","unstructured":"Yeachan Park and Myungjoo Kang . 2020. Membership Inference Attacks Against Object Detection Models. arXiv preprint arXiv:2001.04011 ( 2020 ). Yeachan Park and Myungjoo Kang. 2020. Membership Inference Attacks Against Object Detection Models. arXiv preprint arXiv:2001.04011 (2020)."},{"key":"e_1_3_2_2_35_1","volume-title":"Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. arXiv preprint arXiv:1511.06434","author":"Radford Alec","year":"2015","unstructured":"Alec Radford , Luke Metz , and Soumith Chintala . 2015. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. arXiv preprint arXiv:1511.06434 ( 2015 ). Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. arXiv preprint arXiv:1511.06434 (2015)."},{"key":"e_1_3_2_2_36_1","first-page":"61","article-title":"Membership Inference Attack against Differentially Private Deep Learning","volume":"11","author":"Rahman Md Atiqur","year":"2018","unstructured":"Md Atiqur Rahman , Tanzila Rahman , Robert Lagani\u00e8re , Noman Mohammed , and Yang Wang . 2018 . Membership Inference Attack against Differentially Private Deep Learning Model. Trans. Data Priv. , Vol. 11 , 1 (2018), 61 -- 79 . Md Atiqur Rahman, Tanzila Rahman, Robert Lagani\u00e8re, Noman Mohammed, and Yang Wang. 2018. Membership Inference Attack against Differentially Private Deep Learning Model. Trans. Data Priv., Vol. 11, 1 (2018), 61--79.","journal-title":"Model. Trans. Data Priv."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00780"},{"key":"e_1_3_2_2_38_1","volume-title":"International Conference on Machine Learning. PMLR, 5558--5567","author":"Sablayrolles Alexandre","year":"2019","unstructured":"Alexandre Sablayrolles , Matthijs Douze , Cordelia Schmid , Yann Ollivier , and Herv\u00e9 J\u00e9gou . 2019 . White-box vs Black-box: Bayes Optimal Strategies for Membership Inference . In International Conference on Machine Learning. PMLR, 5558--5567 . Alexandre Sablayrolles, Matthijs Douze, Cordelia Schmid, Yann Ollivier, and Herv\u00e9 J\u00e9gou. 2019. White-box vs Black-box: Bayes Optimal Strategies for Membership Inference. In International Conference on Machine Learning. PMLR, 5558--5567."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23119"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58526-6_44"},{"key":"e_1_3_2_2_41_1","volume-title":"Reconstruction-Based Membership Inference Attacks are Easier on Difficult Problems. arXiv preprint arXiv:2102.07762","author":"Shafran Avital","year":"2021","unstructured":"Avital Shafran , Shmuel Peleg , and Yedid Hoshen . 2021. Reconstruction-Based Membership Inference Attacks are Easier on Difficult Problems. arXiv preprint arXiv:2102.07762 ( 2021 ). Avital Shafran, Shmuel Peleg, and Yedid Hoshen. 2021. Reconstruction-Based Membership Inference Attacks are Easier on Difficult Problems. arXiv preprint arXiv:2102.07762 (2021)."},{"key":"e_1_3_2_2_42_1","volume-title":"Reconciling Utility and Membership Privacy via Knowledge Distillation. arXiv preprint arXiv:1906.06589","author":"Shejwalkar Virat","year":"2019","unstructured":"Virat Shejwalkar and Amir Houmansadr . 2019. Reconciling Utility and Membership Privacy via Knowledge Distillation. arXiv preprint arXiv:1906.06589 ( 2019 ). Virat Shejwalkar and Amir Houmansadr. 2019. Reconciling Utility and Membership Privacy via Knowledge Distillation. arXiv preprint arXiv:1906.06589 (2019)."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_2_44_1","volume-title":"Data and Model Dependencies of Membership Inference Attack. arXiv preprint arXiv:2002.06856","author":"Tonni Shakila Mahjabin","year":"2020","unstructured":"Shakila Mahjabin Tonni , Dinusha Vatsalan , Farhad Farokhi , Dali Kaafar , Zhigang Lu , and Gioacchino Tangari . 2020. Data and Model Dependencies of Membership Inference Attack. arXiv preprint arXiv:2002.06856 ( 2020 ). Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, and Gioacchino Tangari. 2020. Data and Model Dependencies of Membership Inference Attack. arXiv preprint arXiv:2002.06856 (2020)."},{"key":"e_1_3_2_2_45_1","volume-title":"Wenqi Wei, and Lei Yu.","author":"Truex Stacey","year":"2019","unstructured":"Stacey Truex , Ling Liu , Mehmet Emre Gursoy , Wenqi Wei, and Lei Yu. 2019 . Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability. In 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE , 82--91. Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Wenqi Wei, and Lei Yu. 2019. Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability. In 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 82--91."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2019.2930526"},{"key":"e_1_3_2_2_47_1","volume-title":"Defending Model Inversion and Membership Inference Attacks via Prediction Purification. arXiv preprint arXiv:2005.03915","author":"Yang Ziqi","year":"2020","unstructured":"Ziqi Yang , Bin Shao , Bohan Xuan , Ee-Chien Chang , and Fan Zhang . 2020. Defending Model Inversion and Membership Inference Attacks via Prediction Purification. arXiv preprint arXiv:2005.03915 ( 2020 ). Ziqi Yang, Bin Shao, Bohan Xuan, Ee-Chien Chang, and Fan Zhang. 2020. Defending Model Inversion and Membership Inference Attacks via Prediction Purification. arXiv preprint arXiv:2005.03915 (2020)."},{"key":"e_1_3_2_2_48_1","volume-title":"2020 a. Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack. arXiv preprint arXiv:2001.08855","author":"Zhang Bo","year":"2020","unstructured":"Bo Zhang , Ruotong Yu , Haipei Sun , Yanying Li , Jun Xu , and Hui Wang . 2020 a. Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack. arXiv preprint arXiv:2001.08855 ( 2020 ). Bo Zhang, Ruotong Yu, Haipei Sun, Yanying Li, Jun Xu, and Hui Wang. 2020 a. Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack. arXiv preprint arXiv:2001.08855 (2020)."},{"key":"e_1_3_2_2_49_1","volume-title":"GAN Enhanced Membership Inference: A Passive Local Attack in Federated Learning. In ICC 2020--2020 IEEE International Conference on Communications (ICC). IEEE, 1--6.","author":"Zhang Jingwen","year":"2020","unstructured":"Jingwen Zhang , Jiale Zhang , Junjun Chen , and Shui Yu . 2020 b . GAN Enhanced Membership Inference: A Passive Local Attack in Federated Learning. In ICC 2020--2020 IEEE International Conference on Communications (ICC). IEEE, 1--6. Jingwen Zhang, Jiale Zhang, Junjun Chen, and Shui Yu. 2020 b. GAN Enhanced Membership Inference: A Passive Local Attack in Federated Learning. In ICC 2020--2020 IEEE International Conference on Communications (ICC). IEEE, 1--6."}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3497772","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3497772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:29Z","timestamp":1750193309000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3497772"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":49,"alternative-id":["10.1145\/3488932.3497772","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3497772","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}