{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T21:27:26Z","timestamp":1772141246167,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"RGC Early Career Scheme","award":["22200720"],"award-info":[{"award-number":["22200720"]}]},{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2022A1515011652"],"award-info":[{"award-number":["2022A1515011652"]}]},{"name":"NSFC Young Scientists Fund","award":["62006202"],"award-info":[{"award-number":["62006202"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3539376","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:12Z","timestamp":1660331172000},"page":"1358-1367","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Bilateral Dependency Optimization"],"prefix":"10.1145","author":[{"given":"Xiong","family":"Peng","sequence":"first","affiliation":[{"name":"Hong Kong Baptist University, Hong Kong SAR, China"}]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Melbourne, Australia"}]},{"given":"Jingfeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"RIKEN AIP, Tokyo, Japan"}]},{"given":"Long","family":"Lan","sequence":"additional","affiliation":[{"name":"Hong Kong Baptist University, Hong Kong SAR, China"}]},{"given":"Junjie","family":"Ye","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong SAR, China"}]},{"given":"Tongliang","family":"Liu","sequence":"additional","affiliation":[{"name":"The University of Sydney, Sydney, Australia"}]},{"given":"Bo","family":"Han","sequence":"additional","affiliation":[{"name":"Hong Kong Baptist University, Hong Kong SAR, China"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"1","article-title":"Kernel Independent Component Analysis","volume":"3","author":"Bach Francis R.","year":"2002","unstructured":"Francis R. Bach and Michael I. Jordan. 2002. Kernel Independent Component Analysis. Journal of Machine Learning Research, Vol. 3 (2002), 1--48.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Si Chen Mostafa Kahla Ruoxi Jia and Guo-Jun Qi. 2021. Knowledge-Enriched Distributional Model Inversion Attacks. In ICCV.","DOI":"10.1109\/ICCV48922.2021.01587"},{"key":"e_1_3_2_2_3_1","unstructured":"Christopher A Choquette-Choo Florian Tramer Nicholas Carlini and Nicolas Papernot. 2021. Label-only membership inference attacks. In ICML."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Matt Fredrikson Somesh Jha and Thomas Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In CCS.","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_5_1","unstructured":"Matthew Fredrikson Eric Lantz Somesh Jha Simon Lin David Page and Thomas Ristenpart. 2014. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. In USENIX Security."},{"key":"e_1_3_2_2_6_1","unstructured":"Ruize Gao Feng Liu Jingfeng Zhang Bo Han Tongliang Liu Gang Niu and Masashi Sugiyama. 2021. Maximum mean discrepancy test is aware of adversarial attacks. In ICML."},{"key":"e_1_3_2_2_7_1","first-page":"723","article-title":"A kernel two-sample test","volume":"13","author":"Gretton Arthur","year":"2012","unstructured":"Arthur Gretton, Karsten M Borgwardt, Malte J Rasch, Bernhard Sch\u00f6lkopf, and Alexander Smola. 2012. A kernel two-sample test. The Journal of Machine Learning Research, Vol. 13, 1 (2012), 723--773.","journal-title":"The Journal of Machine Learning Research"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Arthur Gretton Olivier Bousquet Alex Smola and Bernhard Sch\u00f6lkopf. 2005 a. Measuring statistical dependence with Hilbert-Schmidt norms. In ALT.","DOI":"10.1007\/11564089_7"},{"key":"e_1_3_2_2_9_1","volume-title":"2005 b. Kernel methods for measuring independence. Journal of Machine Learning Research","author":"Gretton Arthur","year":"2005","unstructured":"Arthur Gretton, Ralf Herbrich, Alexander Smola, Olivier Bousquet, Bernhard Sch\u00f6lkopf, et al. 2005 b. Kernel methods for measuring independence. Journal of Machine Learning Research (2005)."},{"key":"e_1_3_2_2_10_1","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. In CVPR."},{"key":"e_1_3_2_2_11_1","unstructured":"Yangsibo Huang Samyak Gupta Zhao Song Kai Li and Sanjeev Arora. 2021. Evaluating gradient inversion attacks and defenses in federated learning. In NeurIPS."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Tero Karras Samuli Laine Miika Aittala Janne Hellsten Jaakko Lehtinen and Timo Aila. 2020. Analyzing and improving the image quality of stylegan. In CVPR.","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"e_1_3_2_2_13_1","volume-title":"Adam: A method for stochastic optimization. arXiv","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv (2014)."},{"key":"e_1_3_2_2_14_1","volume-title":"Glow: Generative flow with invertible 1x1 convolutions. In NeurIPS.","author":"Kingma Durk P","year":"2018","unstructured":"Durk P Kingma and Prafulla Dhariwal. 2018. Glow: Generative flow with invertible 1x1 convolutions. In NeurIPS."},{"key":"e_1_3_2_2_15_1","volume-title":"Ankur P Parikh, Nicolas Papernot, and Mohit Iyyer.","author":"Krishna Kalpesh","year":"2019","unstructured":"Kalpesh Krishna, Gaurav Singh Tomar, Ankur P Parikh, Nicolas Papernot, and Mohit Iyyer. 2019. Thieves on sesame street! model extraction of bert-based apis. In ICLR."},{"key":"e_1_3_2_2_17_1","volume-title":"Gradient-based learning applied to document recognition. Proc","author":"LeCun Yann","year":"1998","unstructured":"Yann LeCun, L\u00e9on Bottou, Yoshua Bengio, and Patrick Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE (1998)."},{"key":"e_1_3_2_2_18_1","unstructured":"Xin-Chun Li and De-Chuan Zhan. 2021. FedRS: Federated Learning with Restricted Softmax for Label Distribution Non-IID Data. In KDD."},{"key":"e_1_3_2_2_19_1","unstructured":"Yazhe Li Roman Pogodin Danica J Sutherland and Arthur Gretton. 2021. Self-supervised learning with kernel dependence maximization. In NeurIPS."},{"key":"e_1_3_2_2_20_1","volume-title":"Sutherland","author":"Liu Feng","year":"2021","unstructured":"Feng Liu, Wenkai Xu, Jie Lu, and Danica J. Sutherland. 2021. Meta Two-Sample Testing: Learning Kernels for Testing with Limited Data. In NeurIPS."},{"key":"e_1_3_2_2_21_1","unstructured":"Feng Liu Wenkai Xu Jie Lu Guangquan Zhang Arthur Gretton and Danica J Sutherland. 2020. Learning deep kernels for non-parametric two-sample tests. In ICML."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Ziwei Liu Ping Luo Xiaogang Wang and Xiaoou Tang. 2015. Deep learning face attributes in the wild. In ICCV.","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098088"},{"key":"e_1_3_2_2_24_1","volume-title":"Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv","author":"Radford Alec","year":"2015","unstructured":"Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv (2015)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Dimitrios Rafailidis and Yannis Manolopoulos. 2019. Can Virtual Assistants Produce Recommendations?. In WIMS.","DOI":"10.1145\/3326467.3326468"},{"key":"e_1_3_2_2_26_1","volume-title":"A survey of privacy attacks in machine learning. arXiv","author":"Rigaki Maria","year":"2020","unstructured":"Maria Rigaki and Sebastian Garcia. 2020. A survey of privacy attacks in machine learning. arXiv (2020)."},{"key":"e_1_3_2_2_27_1","unstructured":"Ahmed Salem Apratim Bhattacharya Michael Backes Mario Fritz and Yang Zhang. 2020. Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. In USENIX Security."},{"key":"e_1_3_2_2_28_1","volume-title":"Nal Kalchbrenner, Anirudh Goyal, and Yoshua Bengio.","author":"Sch\u00f6lkopf Bernhard","year":"2021","unstructured":"Bernhard Sch\u00f6lkopf, Francesco Locatello, Stefan Bauer, Nan Rosemary Ke, Nal Kalchbrenner, Anirudh Goyal, and Yoshua Bengio. 2021. Toward causal representation learning. arXiv (2021)."},{"key":"e_1_3_2_2_29_1","volume-title":"Facenet: A unified embedding for face recognition and clustering. In CVPR.","author":"Schroff Florian","year":"2015","unstructured":"Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. Facenet: A unified embedding for face recognition and clustering. In CVPR."},{"key":"e_1_3_2_2_30_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv (2014)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Congzheng Song and Ananth Raghunathan. 2020. Information leakage in embedding models. In CCS.","DOI":"10.1145\/3372297.3417270"},{"key":"e_1_3_2_2_32_1","volume-title":"Feature Selection via Dependence Maximization. Journal of Machine Learning Research","author":"Song Le","year":"2012","unstructured":"Le Song, Alex Smola, Arthur Gretton, Justin Bedo, and Karsten Borgwardt. 2012. Feature Selection via Dependence Maximization. Journal of Machine Learning Research (2012)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Le Song Alex Smola Arthur Gretton and Karsten M Borgwardt. 2007. A dependence maximization view of clustering. In ICML.","DOI":"10.1145\/1273496.1273599"},{"key":"e_1_3_2_2_34_1","volume-title":"Deepface: Closing the gap to human-level performance in face verification. In CVPR.","author":"Taigman Yaniv","year":"2014","unstructured":"Yaniv Taigman, Ming Yang, Marc'Aurelio Ranzato, and Lior Wolf. 2014. Deepface: Closing the gap to human-level performance in face verification. In CVPR."},{"key":"e_1_3_2_2_35_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In NeurIPS."},{"key":"e_1_3_2_2_36_1","unstructured":"Kuan-Chieh Wang Yan Fu Ke Li Ashish Khisti Richard Zemel and Alireza Makhzani. 2021. Variational Model Inversion Attacks. In NeurIPS."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"Tianhao Wang Yuheng Zhang and Ruoxi Jia. 2020. Improving robustness to model inversion attacks via mutual information regularization. In AAAI.","DOI":"10.1609\/aaai.v35i13.17387"},{"key":"e_1_3_2_2_38_1","volume-title":"Adversarial neural network inversion via auxiliary knowledge alignment. arXiv","author":"Yang Ziqi","year":"2019","unstructured":"Ziqi Yang, Ee-Chien Chang, and Zhenkai Liang. 2019. Adversarial neural network inversion via auxiliary knowledge alignment. arXiv (2019)."},{"key":"e_1_3_2_2_39_1","volume-title":"Defending model inversion and membership inference attacks via prediction purification. arXiv","author":"Yang Ziqi","year":"2020","unstructured":"Ziqi Yang, Bin Shao, Bohan Xuan, Ee-Chien Chang, and Fan Zhang. 2020. Defending model inversion and membership inference attacks via prediction purification. arXiv (2020)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"Yuheng Zhang Ruoxi Jia Hengzhi Pei Wenxiao Wang Bo Li and Dawn Song. 2020. The secret revealer: Generative model-inversion attacks against deep neural networks. In CVPR.","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"Zirui Zhou Lingyang Chu Changxin Liu Lanjun Wang Jian Pei and Yong Zhang. 2021. Towards Fair Federated Learning. In KDD.","DOI":"10.1145\/3447548.3470814"}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Washington DC USA","acronym":"KDD '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539376","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:47Z","timestamp":1750186967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539376"}},"subtitle":["Defending Against Model-inversion Attacks"],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":40,"alternative-id":["10.1145\/3534678.3539376","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3539376","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}