{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:51Z","timestamp":1773511251457,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science and Technology Major Project of China","award":["2022ZD0119103"],"award-info":[{"award-number":["2022ZD0119103"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690202","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1241-1255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Unified Membership Inference Method for Visual Self-supervised Encoder via Part-aware Capability"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3490-4131","authenticated-orcid":false,"given":"Jie","family":"Zhu","sequence":"first","affiliation":[{"name":"Key Lab of High Confidence Software Technologies (Peking University), Ministry of Education &amp; School of Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4824-6976","authenticated-orcid":false,"given":"Jirong","family":"Zha","sequence":"additional","affiliation":[{"name":"Tsinghua-Berkeley Shenzhen Institute, Tsinghua University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7558-9137","authenticated-orcid":false,"given":"Ding","family":"Li","sequence":"additional","affiliation":[{"name":"Key Lab of High Confidence Software Technologies (Peking University), Ministry of Education &amp; School of Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7627-8485","authenticated-orcid":false,"given":"Leye","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Lab of High Confidence Software Technologies (Peking University), Ministry of Education &amp; School of Computer Science, Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Facebook--Cambridge Analytica data scandal. https:\/\/en.wikipedia.org\/wiki\/Facebook-Cambridge_Analytica_data_scandal."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. Twitter demands AI company stops 'collecting faces'. https:\/\/www.bbc.com\/news\/technology-51220654."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. FTC settlement with Ever orders data and AIs deleted after facial recognition pivot. https:\/\/techcrunch.com\/2021\/01\/12\/ftc-settlement-with-ever-orders-data-and-ais-deleted-after-facial-recognition-pivot."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_5_1","volume-title":"BEiT: BERT Pre-Training of Image Transformers. In International Conference on Learning Representations.","author":"Bao Hangbo","year":"2022","unstructured":"Hangbo Bao, Li Dong, Songhao Piao, and Furu Wei. 2022. BEiT: BERT Pre-Training of Image Transformers. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_6_1","volume-title":"VICReg: Variance-Invariance-Covariance Regularization For Self-Supervised Learning. In International Conference on Learning Representations.","author":"Bardes Adrien","year":"2022","unstructured":"Adrien Bardes, Jean Ponce, and Yann Lecun. 2022. VICReg: Variance-Invariance-Covariance Regularization For Self-Supervised Learning. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_7_1","volume-title":"Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2013, Prague, Czech Republic, September 23--27, 2013, Proceedings, Part III 13","author":"Biggio Battista","year":"2013","unstructured":"Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim 'rndic, Pavel Laskov, Giorgio Giacinto, and Fabio Roli. 2013. Evasion attacks against machine learning at test time. In Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2013, Prague, Czech Republic, September 23--27, 2013, Proceedings, Part III 13. Springer, 387--402."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"e_1_3_2_1_9_1","volume-title":"28th USENIX Security Symposium. 267--284","author":"Carlini Nicholas","year":"2019","unstructured":"Nicholas Carlini, Chang Liu, \u00dalfar Erlingsson, Jernej Kos, and Dawn Song. 2019. The secret sharer: Evaluating and testing unintended memorization in neural networks. In 28th USENIX Security Symposium. 267--284."},{"key":"e_1_3_2_1_10_1","first-page":"9912","article-title":"Unsupervised learning of visual features by contrasting cluster assignments","volume":"33","author":"Caron Mathilde","year":"2020","unstructured":"Mathilde Caron, Ishan Misra, Julien Mairal, Priya Goyal, Piotr Bojanowski, and Armand Joulin. 2020. Unsupervised learning of visual features by contrasting cluster assignments. Advances in Neural Information Processing Systems 33 (2020), 9912--9924.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00951"},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Machine Learning. PMLR, 1597--1607","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International Conference on Machine Learning. PMLR, 1597--1607."},{"key":"e_1_3_2_1_13_1","first-page":"22243","article-title":"Big self-supervised models are strong semi-supervised learners","volume":"33","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Kevin Swersky, Mohammad Norouzi, and Geoffrey E Hinton. 2020. Big self-supervised models are strong semi-supervised learners. Advances in Neural Information Processing Systems 33 (2020), 22243--22255.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_14_1","volume-title":"Context autoencoder for self-supervised representation learning. arXiv preprint arXiv:2202.03026","author":"Chen Xiaokang","year":"2022","unstructured":"Xiaokang Chen, Mingyu Ding, Xiaodi Wang, Ying Xin, Shentong Mo, Yunhao Wang, Shumin Han, Ping Luo, Gang Zeng, and Jingdong Wang. 2022. Context autoencoder for self-supervised representation learning. arXiv preprint arXiv:2202.03026 (2022)."},{"key":"e_1_3_2_1_15_1","volume-title":"Improved baselines with momentum contrastive learning. arXiv preprint arXiv:2003.04297","author":"Chen Xinlei","year":"2020","unstructured":"Xinlei Chen, Haoqi Fan, Ross Girshick, and Kaiming He. 2020. Improved baselines with momentum contrastive learning. arXiv preprint arXiv:2003.04297 (2020)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00950"},{"key":"e_1_3_2_1_17_1","volume-title":"Intrainstance vicreg: Bag of self-supervised image patch embedding. arXiv preprint arXiv:2206.08954","author":"Chen Yubei","year":"2022","unstructured":"Yubei Chen, Adrien Bardes, Zengyi Li, and Yann LeCun. 2022. Intrainstance vicreg: Bag of self-supervised image patch embedding. arXiv preprint arXiv:2206.08954 (2022)."},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Machine Learning. PMLR","author":"Choquette-Choo Christopher A","year":"2021","unstructured":"Christopher A Choquette-Choo, Florian Tramer, Nicholas Carlini, and Nicolas Papernot. 2021. Label-only membership inference attacks. In International Conference on Machine Learning. PMLR, 1964--1974."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559355"},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Learning Representations.","author":"Dosovitskiy Alexey","year":"2020","unstructured":"Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, et al. 2020. An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Vasisht Duddu Antoine Boutet and Virat Shejwalkar. 2020. Quantifying privacy leakage in graph embedding. In MobiQuitous 2020--17th EAI International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services. 76--85.","DOI":"10.1145\/3448891.3448939"},{"key":"e_1_3_2_1_23_1","first-page":"12058","article-title":"Dataset inference for self-supervised models","volume":"35","author":"Dziedzic Adam","year":"2022","unstructured":"Adam Dziedzic, Haonan Duan, Muhammad Ahmad Kaleem, Nikita Dhawan, Jonas Guan, Yannis Cattan, Franziska Boenisch, and Nicolas Papernot. 2022. Dataset inference for self-supervised models. Advances in Neural Information Processing Systems 35 (2022), 12058--12070.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference on Machine Learning. PMLR, 3015--3024","author":"Ermolov Aleksandr","year":"2021","unstructured":"Aleksandr Ermolov, Aliaksandr Siarohin, Enver Sangineto, and Nicu Sebe. 2021. Whitening for self-supervised representation learning. In International Conference on Machine Learning. PMLR, 3015--3024."},{"key":"e_1_3_2_1_25_1","volume-title":"A Cookbook of Self-Supervised Learning. arXiv preprint arXiv:2304.12210","author":"Geiping Jonas","year":"2023","unstructured":"Jonas Geiping, Quentin Garrido, Pierre Fernandez, Amir Bar, Hamed Pirsiavash, Yann LeCun, and Micah Goldblum. 2023. A Cookbook of Self-Supervised Learning. arXiv preprint arXiv:2304.12210 (2023)."},{"key":"e_1_3_2_1_26_1","volume-title":"Generative adversarial networks. Commun. ACM","author":"Goodfellow Ian","year":"2020","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2020. Generative adversarial networks. Commun. ACM (2020), 139--144."},{"key":"e_1_3_2_1_27_1","volume-title":"Zhaohan Guo, Mohammad Gheshlaghi Azar, et al .","author":"Grill Jean-Bastien","year":"2020","unstructured":"Jean-Bastien Grill, Florian Strub, Florent Altch\u00e9, Corentin Tallec, Pierre Richemond, Elena Buchatskaya, Carl Doersch, Bernardo Avila Pires, Zhaohan Guo, Mohammad Gheshlaghi Azar, et al . 2020. Bootstrap your own latent-a new approach to self-supervised learning. Advances in Neural Information Processing Systems (2020), 21271--21284."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0008"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_32_1","volume-title":"et al","author":"Hinton Geoffrey","year":"2015","unstructured":"Geoffrey Hinton, Oriol Vinyals, Jeff Dean, et al . 2015. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 2, 7 (2015)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3523273"},{"key":"e_1_3_2_1_34_1","volume-title":"Advances in Neural Information Processing Systems (2022)","author":"Hu Pingyi","year":"2022","unstructured":"Pingyi Hu, Zihan Wang, Ruoxi Sun, Hu Wang, and Minhui Xue. 2022. M4I: Multi-modal Models Membership Inference. Advances in Neural Information Processing Systems (2022), 1867--1882."},{"key":"e_1_3_2_1_35_1","volume-title":"Exploring long-sequence masked autoencoders. arXiv preprint arXiv:2210.07224","author":"Hu Ronghang","year":"2022","unstructured":"Ronghang Hu, Shoubhik Debnath, Saining Xie, and Xinlei Chen. 2022. Exploring long-sequence masked autoencoders. arXiv preprint arXiv:2210.07224 (2022)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00001"},{"key":"e_1_3_2_1_37_1","volume-title":"28th USENIX Security Symposium. 1895--1912","author":"Jayaraman Bargav","year":"2019","unstructured":"Bargav Jayaraman and David Evans. 2019. Evaluating differentially private machine learning in practice. In 28th USENIX Security Symposium. 1895--1912."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833644"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363201"},{"key":"e_1_3_2_1_40_1","first-page":"2983","article-title":"Adversarial self-supervised contrastive learning","volume":"33","author":"Kim Minseon","year":"2020","unstructured":"Minseon Kim, Jihoon Tack, and Sung Ju Hwang. 2020. Adversarial self-supervised contrastive learning. Advances in Neural Information Processing Systems 33 (2020), 2983--2994.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_41_1","volume-title":"Mixco: Mix-up contrastive learning for visual representation. arXiv preprint arXiv:2010.06300","author":"Kim Sungnyun","year":"2020","unstructured":"Sungnyun Kim, Gihun Lee, Sangmin Bae, and Se-Young Yun. 2020. Mixco: Mix-up contrastive learning for visual representation. arXiv preprint arXiv:2010.06300 (2020)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00371"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00604"},{"key":"e_1_3_2_1_44_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_45_1","volume-title":"Tiny imagenet visual recognition challenge. CS 231N","author":"Le Ya","year":"2015","unstructured":"Ya Le and Xuan Yang. 2015. Tiny imagenet visual recognition challenge. CS 231N (2015)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_1_47_1","volume-title":"31st USENIX Security Symposium. 3629--3645","author":"Liu Hongbin","year":"2022","unstructured":"Hongbin Liu, Jinyuan Jia, and Neil Zhenqiang Gong. 2022. PoisonedEncoder: Poisoning the unlabeled pre-training data in contrastive learning. In 31st USENIX Security Symposium. 3629--3645."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484749"},{"key":"e_1_3_2_1_49_1","volume-title":"et al","author":"Liu Shilong","year":"2023","unstructured":"Shilong Liu, Zhaoyang Zeng, Tianhe Ren, Feng Li, Hao Zhang, Jie Yang, Chunyuan Li, Jianwei Yang, Hang Su, Jun Zhu, et al . 2023. Grounding dino: Marrying dino with grounded pre-training for open-set object detection. arXiv preprint arXiv:2303.05499 (2023)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560586"},{"key":"e_1_3_2_1_51_1","volume-title":"31st USENIX Security Symposium. 4525--4542","author":"Liu Yugeng","year":"2022","unstructured":"Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, and Yang Zhang. 2022. ML-Doctor: Holistic risk assessment of inference attacks against machine learning models. In 31st USENIX Security Symposium. 4525--4542."},{"key":"e_1_3_2_1_52_1","volume-title":"Segment anything in medical images. Nature Communications","author":"Ma Jun","year":"2024","unstructured":"Jun Ma, Yuting He, Feifei Li, Lin Han, Chenyu You, and Bo Wang. 2024. Segment anything in medical images. Nature Communications (2024), 654."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449855"},{"key":"e_1_3_2_1_54_1","volume-title":"Membership inference on word embedding and beyond. arXiv preprint arXiv:2106.11384","author":"Mahloujifar Saeed","year":"2021","unstructured":"Saeed Mahloujifar, Huseyin A Inan, Melissa Chase, Esha Ghosh, and Marcello Hasegawa. 2021. Membership inference on word embedding and beyond. arXiv preprint arXiv:2106.11384 (2021)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243855"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_57_1","volume-title":"Representation learning with contrastive predictive coding. arXiv preprint arXiv:1807.03748","author":"van den Oord Aaron","year":"2018","unstructured":"Aaron van den Oord, Yazhe Li, and Oriol Vinyals. 2018. Representation learning with contrastive predictive coding. arXiv preprint arXiv:1807.03748 (2018)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i2.25300"},{"key":"e_1_3_2_1_59_1","unstructured":"Md Atiqur Rahman Tanzila Rahman Robert Lagani\u00e8re Noman Mohammed and Yang Wang. 2018. Membership Inference Attack against Differentially Private Deep Learning Model. Trans. Data Priv. (2018) 61--79."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01298"},{"key":"e_1_3_2_1_61_1","volume-title":"ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In Network and Distributed System Symposium.","author":"Salem Ahmed","year":"2019","unstructured":"Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2019. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In Network and Distributed System Symposium."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i11.17150"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1310--1321","author":"Shokri Reza","year":"2015","unstructured":"Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1310--1321."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417270"},{"key":"e_1_3_2_1_66_1","volume-title":"30th USENIX Security Symposium. 2615--2632","author":"Song Liwei","year":"2021","unstructured":"Liwei Song and Prateek Mittal. 2021. Systematic evaluation of privacy risks of machine learning models. In 30th USENIX Security Symposium. 2615--2632."},{"key":"e_1_3_2_1_67_1","volume-title":"2nd International Conference on Learning Representations.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In 2nd International Conference on Learning Representations."},{"key":"e_1_3_2_1_68_1","volume-title":"31st USENIX Security Symposium. 1433--1450","author":"Tang Xinyu","year":"2022","unstructured":"Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, and Prateek Mittal. 2022. Mitigating membership inference attacks by Self-Distillation through a novel ensemble architecture. In 31st USENIX Security Symposium. 1433--1450."},{"key":"e_1_3_2_1_69_1","volume-title":"International Conference on Machine Learning. PMLR, 10347--10357","author":"Touvron Hugo","year":"2021","unstructured":"Hugo Touvron, Matthieu Cord, Matthijs Douze, Francisco Massa, Alexandre Sablayrolles, and Herv\u00e9 J\u00e9gou. 2021. Training data-efficient image transformers & distillation through attention. In International Conference on Machine Learning. PMLR, 10347--10357."},{"key":"e_1_3_2_1_70_1","volume-title":"Membership Inference Attacks Against Self-supervised Speech Models. arXiv preprint arXiv:2111.05113","author":"Tseng Wei-Cheng","year":"2021","unstructured":"Wei-Cheng Tseng, Wei-Tsung Kao, and Hung-yi Lee. 2021. Membership Inference Attacks Against Self-supervised Speech Models. arXiv preprint arXiv:2111.05113 (2021)."},{"key":"e_1_3_2_1_71_1","volume-title":"Attention is all you need. Advances in Neural Information Processing Systems 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in Neural Information Processing Systems 30 (2017)."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/432"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01100"},{"key":"e_1_3_2_1_74_1","volume-title":"Contrastive Learning Rivals Masked Image Modeling in Fine-tuning via Feature Distillation. arXiv preprint arXiv:2205.14141","author":"Wei Yixuan","year":"2022","unstructured":"Yixuan Wei, Han Hu, Zhenda Xie, Zheng Zhang, Yue Cao, Jianmin Bao, Dong Chen, and Baining Guo. 2022. Contrastive Learning Rivals Masked Image Modeling in Fine-tuning via Feature Distillation. arXiv preprint arXiv:2205.14141 (2022)."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01391"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00943"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"e_1_3_2_1_78_1","volume-title":"Membership Inference Attacks and Defenses in Neural Network Pruning. In 31st USENIX Security Symposium. 4561--4578","author":"Yuan Xiaoyong","year":"2022","unstructured":"Xiaoyong Yuan and Lan Zhang. 2022. Membership Inference Attacks and Defenses in Neural Network Pruning. In 31st USENIX Security Symposium. 4561--4578."},{"key":"e_1_3_2_1_79_1","volume-title":"International Conference on Machine Learning. PMLR, 12310--12320","author":"Zbontar Jure","year":"2021","unstructured":"Jure Zbontar, Li Jing, Ishan Misra, Yann LeCun, and St\u00e9phane Deny. 2021. Barlow twins: Self-supervised learning via redundancy reduction. In International Conference on Machine Learning. PMLR, 12310--12320."},{"key":"e_1_3_2_1_80_1","volume-title":"International Conference on Learning Representations.","author":"Zhang Hongyi","year":"2018","unstructured":"Hongyi Zhang, Moustapha Cisse, Yann N Dauphin, and David Lopez-Paz. 2018. mixup: Beyond Empirical Risk Minimization. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_81_1","volume-title":"Is self-supervised learning more robust than supervised learning? arXiv preprint arXiv:2206.05259","author":"Zhong Yuanyi","year":"2022","unstructured":"Yuanyi Zhong, Haoran Tang, Junkun Chen, Jian Peng, and Yu-Xiong Wang. 2022. Is self-supervised learning more robust than supervised learning? arXiv preprint arXiv:2206.05259 (2022)."},{"key":"e_1_3_2_1_82_1","volume-title":"Image BERT Pre-training with Online Tokenizer. In International Conference on Learning Representations.","author":"Zhou Jinghao","year":"2022","unstructured":"Jinghao Zhou, Chen Wei, Huiyu Wang, Wei Shen, Cihang Xie, Alan Yuille, and Tao Kong. 2022. Image BERT Pre-training with Online Tokenizer. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_83_1","volume-title":"E-CRF: Embedded Conditional Random Field for Boundary-caused Class Weights Confusion in Semantic Segmentation. In The Eleventh International Conference on Learning Representations.","author":"Zhu Jie","year":"2023","unstructured":"Jie Zhu, Huabin Huang, Banghuai Li, and Leye Wang. 2023. E-CRF: Embedded Conditional Random Field for Boundary-caused Class Weights Confusion in Semantic Segmentation. In The Eleventh International Conference on Learning Representations."},{"key":"e_1_3_2_1_84_1","volume-title":"Understanding Self-Supervised Pretraining with Part-Aware Representation Learning. Transactions on Machine Learning Research","author":"Zhu Jie","year":"2023","unstructured":"Jie Zhu, Jiyang Qi, Mingyu Ding, Xiaokang Chen, Ping Luo, Xinggang Wang, Wenyu Liu, Leye Wang, and Jingdong Wang. 2023. Understanding Self-Supervised Pretraining with Part-Aware Representation Learning. Transactions on Machine Learning Research (2023)."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556906"},{"key":"e_1_3_2_1_86_1","volume-title":"Why Not Both? Bi-Objective Optimized Model Compression against Heterogeneous Attacks Toward AI Software Deployment","author":"Zhu Jie","year":"2024","unstructured":"Jie Zhu, Leye Wang, Xiao Han, Anmin Liu, and Tao Xie. 2024. Safety and Performance, Why Not Both? Bi-Objective Optimized Model Compression against Heterogeneous Attacks Toward AI Software Deployment. IEEE Transactions on Software Engineering (2024)."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:06:47Z","timestamp":1755842807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":86,"alternative-id":["10.1145\/3658644.3690202","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690202","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}