{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T21:49:00Z","timestamp":1771710540817,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1145\/3581783.3612072","type":"proceedings-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T07:27:12Z","timestamp":1698391632000},"page":"5614-5622","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Model Inversion Attack via Dynamic Memory Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0032-6786","authenticated-orcid":false,"given":"Gege","family":"Qi","sequence":"first","affiliation":[{"name":"Alibaba Group, Hang Zhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9027-3421","authenticated-orcid":false,"given":"YueFeng","family":"Chen","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hang Zhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4486-556X","authenticated-orcid":false,"given":"Xiaofeng","family":"Mao","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hang Zhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2160-7595","authenticated-orcid":false,"given":"Binyuan","family":"Hui","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4997-2252","authenticated-orcid":false,"given":"Xiaodan","family":"Li","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hang Zhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8482-8686","authenticated-orcid":false,"given":"Rong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hang Zhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2093-2839","authenticated-orcid":false,"given":"Hui","family":"Xue","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hang Zhou, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Gamin: An adversarial approach to black-box model inversion. arXiv preprint arXiv:1909.11835","author":"A\u00efvodji Ulrich","year":"2019","unstructured":"Ulrich A\u00efvodji, S\u00e9bastien Gambs, and Timon Ther. 2019. Gamin: An adversarial approach to black-box model inversion. arXiv preprint arXiv:1909.11835 (2019)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24335"},{"key":"e_1_3_2_1_3_1","unstructured":"Si Chen Ruoxi Jia and Guo-Jun Qi. 2020. Improved techniques for model inversion attacks. (2020)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01587"},{"key":"e_1_3_2_1_5_1","volume-title":"The 32nd International Conference on Neural Information Processing Systems","author":"Chenshen WU","year":"2018","unstructured":"WU Chenshen, L HERRANZ, LIU Xialei, et al. 2018. Memory replay GANs: Learning to generate images from new categories without forgetting [C]. In The 32nd International Conference on Neural Information Processing Systems, Montr\u00e9al, Canada. 5966--5976."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-005-5724-z"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_10_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Fredrikson Matthew","year":"2014","unstructured":"Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. 2014. Privacy in pharmacogenetics: An {End-to-End} case study of personalized warfarin dosing. In 23rd USENIX Security Symposium (USENIX Security 14). 17--32."},{"key":"e_1_3_2_1_11_1","volume-title":"Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)","author":"Guan Hongtao","unstructured":"Hongtao Guan, Yijie Wang, Xingkong Ma, and Yongmou Li. 2019. DCIGAN: a distributed class-incremental learning method based on generative adversarial networks. In 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom). IEEE, 768--775."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_13_1","volume-title":"Gans trained by a two time-scale update rule converge to a local nash equilibrium. Advances in neural information processing systems 30","author":"Heusel Martin","year":"2017","unstructured":"Martin Heusel, Hubert Ramsauer, Thomas Unterthiner, Bernhard Nessler, and Sepp Hochreiter. 2017. Gans trained by a two time-scale update rule converge to a local nash equilibrium. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00023"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_3_2_1_16_1","first-page":"12104","article-title":"Training generative adversarial networks with limited data","volume":"33","author":"Karras Tero","year":"2020","unstructured":"Tero Karras, Miika Aittala, Janne Hellsten, Samuli Laine, Jaakko Lehtinen, and Timo Aila. 2020. Training generative adversarial networks with limited data. Advances in Neural Information Processing Systems 33 (2020), 12104--12114.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3140687"},{"key":"e_1_3_2_1_20_1","volume-title":"Adam: A Method for Stochastic Optimization. In ICLR (Poster).","author":"Kingma Diederik P","year":"2015","unstructured":"Diederik P Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In ICLR (Poster)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"e_1_3_2_1_22_1","volume-title":"Improved precision and recall metric for assessing generative models. Advances in Neural Information Processing Systems 32","author":"Kynk\u00e4\u00e4nniemi Tuomas","year":"2019","unstructured":"Tuomas Kynk\u00e4\u00e4nniemi, Tero Karras, Samuli Laine, Jaakko Lehtinen, and Timo Aila. 2019. Improved precision and recall metric for assessing generative models. Advances in Neural Information Processing Systems 32 (2019)."},{"key":"e_1_3_2_1_23_1","unstructured":"Yann LeCun Corinna Cortes and Chris Burges. 2010. MNIST handwritten digit database."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851986"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_3_2_1_26_1","volume-title":"International Conference on Machine Learning. PMLR, 7176--7185","author":"Naeem Muhammad Ferjad","year":"2020","unstructured":"Muhammad Ferjad Naeem, Seong Joon Oh, Youngjung Uh, Yunjey Choi, and Jaejun Yoo. 2020. Reliable fidelity and diversity metrics for generative models. In International Conference on Machine Learning. PMLR, 7176--7185."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025068"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Omkar M Parkhi Andrea Vedaldi and Andrew Zisserman. 2015. Deep face recognition. (2015).","DOI":"10.5244\/C.29.41"},{"key":"e_1_3_2_1_29_1","volume-title":"International conference on machine learning. PMLR, 8748--8763","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et al. 2021. Learning transferable visual models from natural language supervision. In International conference on machine learning. PMLR, 8748--8763."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_31_1","unstructured":"Academy Medical Sciences. 2015. Stratified personalised or P4 medicine: a new direction for placing the patient at the centre of healthcare and health education. (2015)."},{"key":"e_1_3_2_1_32_1","volume-title":"Continual learning in generative adversarial nets. arXiv preprint arXiv:1705.08395","author":"Seff Ari","year":"2017","unstructured":"Ari Seff, Alex Beatson, Daniel Suo, and Han Liu. 2017. Continual learning in generative adversarial nets. arXiv preprint arXiv:1705.08395 (2017)."},{"key":"e_1_3_2_1_33_1","volume-title":"Defending against adversarial attacks by suppressing the largest eigenvalue of fisher information matrix. arXiv preprint arXiv:1909.06137","author":"Shen Chaomin","year":"2019","unstructured":"Chaomin Shen, Yaxin Peng, Guixu Zhang, and Jinsong Fan. 2019. Defending against adversarial attacks by suppressing the largest eigenvalue of fisher information matrix. arXiv preprint arXiv:1909.06137 (2019)."},{"key":"e_1_3_2_1_34_1","volume-title":"Antonia Adler, and Kristian Kersting.","author":"Struppek Lukas","year":"2022","unstructured":"Lukas Struppek, Dominik Hintersdorf, Antonio De Almeida Correia, Antonia Adler, and Kristian Kersting. 2022. Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks. arXiv preprint arXiv:2201.12179 (2022)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_3_2_1_36_1","volume-title":"On catastrophic forgetting in generative adversarial networks. arXiv preprint arXiv:1807.04015","author":"Thanh-Tung Hoang","year":"2018","unstructured":"Hoang Thanh-Tung and Truyen Tran. 2018. On catastrophic forgetting in generative adversarial networks. arXiv preprint arXiv:1807.04015 (2018)."},{"key":"e_1_3_2_1_37_1","volume-title":"Variational Model Inversion Attacks. Advances in Neural Information Processing Systems 34","author":"Wang Kuan-Chieh","year":"2021","unstructured":"Kuan-Chieh Wang, Yan Fu, Ke Li, Ashish Khisti, Richard Zemel, and Alireza Makhzani. 2021. Variational Model Inversion Attacks. Advances in Neural Information Processing Systems 34 (2021)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133163"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2016.32"},{"key":"e_1_3_2_1_40_1","volume-title":"Adversarial neural network inversion via auxiliary knowledge alignment. arXiv preprint arXiv:1902.08552","author":"Yang Ziqi","year":"2019","unstructured":"Ziqi Yang, Ee-Chien Chang, and Zhenkai Liang. 2019. Adversarial neural network inversion via auxiliary knowledge alignment. arXiv preprint arXiv:1902.08552 (2019)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58589-1_24"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00285"},{"key":"e_1_3_2_1_43_1","volume-title":"Resnest: Split-attention networks. arXiv preprint arXiv:2004.08955","author":"Zhang Hang","year":"2020","unstructured":"Hang Zhang, Chongruo Wu, Zhongyue Zhang, Yi Zhu, Haibin Lin, Zhi Zhang, Yue Sun, Tong He, Jonas Mueller, R Manmatha, et al. 2020. Resnest: Split-attention networks. arXiv preprint arXiv:2004.08955 (2020)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015869"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00072"}],"event":{"name":"MM '23: The 31st ACM International Conference on Multimedia","location":"Ottawa ON Canada","acronym":"MM '23","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 31st ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3612072","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581783.3612072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:04:14Z","timestamp":1755821054000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3612072"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":46,"alternative-id":["10.1145\/3581783.3612072","10.1145\/3581783"],"URL":"https:\/\/doi.org\/10.1145\/3581783.3612072","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]},"assertion":[{"value":"2023-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}