{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:48Z","timestamp":1750309608955,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707783","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:54Z","timestamp":1747247214000},"page":"1522-1530","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Identity-Focused Inference and Extraction Attacks on Diffusion Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0286-6380","authenticated-orcid":false,"given":"Jayneel","family":"Vora","sequence":"first","affiliation":[{"name":"University of California, Davis, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4571-8484","authenticated-orcid":false,"given":"Nader","family":"Bouacida","sequence":"additional","affiliation":[{"name":"University of California Davis, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6221-2728","authenticated-orcid":false,"given":"Aditya","family":"Krishnan","sequence":"additional","affiliation":[{"name":"University of California Davis, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9909-8527","authenticated-orcid":false,"given":"Prabhu","family":"Shankar","sequence":"additional","affiliation":[{"name":"University of California Davis Health, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2768-5308","authenticated-orcid":false,"given":"Prasant","family":"Mohapatra","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, Tampa, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Rishi Bommasani Drew A Hudson Ehsan Adeli Russ Altman Simran Arora Sydney von Arx Michael S Bernstein Jeannette Bohg Antoine Bosselut Emma Brunskill et al. 2021. On the opportunities and risks of foundation models. arXiv preprint arXiv:2108.07258 (2021)."},{"key":"e_1_3_2_1_2_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Carlini Nicolas","year":"2023","unstructured":"Nicolas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tramer, Borja Balle, Daphne Ippolito, and Eric Wallace. 2023. Extracting training data from diffusion models. In 32nd USENIX Security Symposium (USENIX Security 23). 5253\u20135270."},{"key":"e_1_3_2_1_3_1","volume-title":"Is my Data in your AI Model? Membership Inference Test with Application to Face Images. arXiv preprint arXiv:2402.09225","author":"DeAlcala Daniel","year":"2024","unstructured":"Daniel DeAlcala, Aythami Morales, Gonzalo Mancera, Julian Fierrez, Ruben Tolosana, and Javier Ortega-Garcia. 2024. Is my Data in your AI Model? Membership Inference Test with Application to Face Images. arXiv preprint arXiv:2402.09225 (2024)."},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Machine Learning. PMLR, 8717\u20138730","author":"Duan Jinhao","year":"2023","unstructured":"Jinhao Duan, Fei Kong, Shiqi Wang, Xiaoshuang Shi, and Kaidi Xu. 2023. Are diffusion models vulnerable to membership inference attacks?. In International Conference on Machine Learning. PMLR, 8717\u20138730."},{"key":"e_1_3_2_1_5_1","volume-title":"Model Will Tell: Training Membership Inference for Diffusion Models. arXiv preprint arXiv:2403.08487","author":"Fu Xiaomeng","year":"2024","unstructured":"Xiaomeng Fu, Xi Wang, Qiao Li, Jin Liu, Jiao Dai, and Jizhong Han. 2024. Model Will Tell: Training Membership Inference for Diffusion Models. arXiv preprint arXiv:2403.08487 (2024)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"e_1_3_2_1_7_1","volume-title":"Denoising diffusion probabilistic models. Advances in neural information processing systems 33","author":"Ho Jonathan","year":"2020","unstructured":"Jonathan Ho, Ajay Jain, and Pieter Abbeel. 2020. Denoising diffusion probabilistic models. Advances in neural information processing systems 33 (2020), 6840\u20136851."},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Cascaded diffusion models for high fidelity image generation","volume":"23","author":"Ho Jonathan","year":"2022","unstructured":"Jonathan Ho, Chitwan Saharia, William Chan, David J Fleet, Mohammad Norouzi, and Tim Salimans. 2022. Cascaded diffusion models for high fidelity image generation. Journal of Machine Learning Research 23, 47 (2022), 1\u201333.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_9_1","first-page":"8633","article-title":"Video diffusion models","volume":"35","author":"Ho Jonathan","year":"2022","unstructured":"Jonathan Ho, Tim Salimans, Alexey Gritsenko, William Chan, Mohammad Norouzi, and David J Fleet. 2022. Video diffusion models. Advances in Neural Information Processing Systems 35 (2022), 8633\u20138646.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_10_1","volume-title":"Workshop on faces in 'Real-Life' Images: detection, alignment, and recognition.","author":"Huang Gary B","year":"2008","unstructured":"Gary B Huang, Marwan Mattar, Tamara Berg, and Eric Learned-Miller. 2008. Labeled faces in the wild: A database forstudying face recognition in unconstrained environments. In Workshop on faces in 'Real-Life' Images: detection, alignment, and recognition."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00589"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01223"},{"key":"e_1_3_2_1_13_1","volume-title":"Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114","author":"Kingma Diederik P","year":"2013","unstructured":"Diederik P Kingma. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)."},{"key":"e_1_3_2_1_14_1","volume-title":"An efficient membership inference attack for the diffusion model by proximal initialization. arXiv preprint arXiv:2305.18355","author":"Kong Fei","year":"2023","unstructured":"Fei Kong, Jinhao Duan, RuiPeng Ma, Hengtao Shen, Xiaofeng Zhu, Xiaoshuang Shi, and Kaidi Xu. 2023. An efficient membership inference attack for the diffusion model by proximal initialization. arXiv preprint arXiv:2305.18355 (2023)."},{"key":"e_1_3_2_1_15_1","volume-title":"Towards Black-Box Membership Inference Attack for Diffusion Models. arXiv preprint arXiv:2405.20771","author":"Li Jingwei","year":"2024","unstructured":"Jingwei Li, Jing Dong, Tianxing He, and Jingzhao Zhang. 2024. Towards Black-Box Membership Inference Attack for Diffusion Models. arXiv preprint arXiv:2405.20771 (2024)."},{"key":"e_1_3_2_1_16_1","volume-title":"Unveiling Structural Memorization: Structural Membership Inference Attack for Text-to-Image Diffusion Models. arXiv preprint arXiv:2407.13252","author":"Li Qiao","year":"2024","unstructured":"Qiao Li, Xiaomeng Fu, Xi Wang, Jin Liu, Xingyu Gao, Jiao Dai, and Jizhong Han. 2024. Unveiling Structural Memorization: Structural Membership Inference Attack for Text-to-Image Diffusion Models. arXiv preprint arXiv:2407.13252 (2024)."},{"key":"e_1_3_2_1_17_1","volume-title":"Audioldm 2: Learning holistic audio generation with self-supervised pretraining","author":"Liu Haohe","year":"2024","unstructured":"Haohe Liu, Yi Yuan, Xubo Liu, Xinhao Mei, Qiuqiang Kong, Qiao Tian, Yuping Wang, Wenwu Wang, Yuxuan Wang, and Mark D Plumbley. 2024. Audioldm 2: Learning holistic audio generation with self-supervised pretraining. IEEE\/ACM Transactions on Audio, Speech, and Language Processing (2024)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW59333.2023.00013"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-020-01027-6"},{"key":"e_1_3_2_1_21_1","volume-title":"Black-box membership inference attacks against fine-tuned diffusion models. arXiv preprint arXiv:2312.08207","author":"Pang Yan","year":"2023","unstructured":"Yan Pang and Tianhao Wang. 2023. Black-box membership inference attacks against fine-tuned diffusion models. arXiv preprint arXiv:2312.08207 (2023)."},{"key":"e_1_3_2_1_22_1","volume-title":"White-box membership inference attacks against diffusion models. arXiv preprint arXiv:2308.06405","author":"Pang Yan","year":"2023","unstructured":"Yan Pang, Tianhao Wang, Xuhui Kang, Mengdi Huai, and Yang Zhang. 2023. White-box membership inference attacks against diffusion models. arXiv preprint arXiv:2308.06405 (2023)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528233.3530757"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_26_1","volume-title":"International conference on machine learning. PMLR, 2256\u20132265","author":"Sohl-Dickstein Jascha","year":"2015","unstructured":"Jascha Sohl-Dickstein, Eric Weiss, Niru Maheswaranathan, and Surya Ganguli. 2015. Deep unsupervised learning using nonequilibrium thermodynamics. In International conference on machine learning. PMLR, 2256\u20132265."},{"key":"e_1_3_2_1_27_1","volume-title":"Denoising diffusion implicit models. arXiv preprint arXiv:2010.02502","author":"Song Jiaming","year":"2020","unstructured":"Jiaming Song, Chenlin Meng, and Stefano Ermon. 2020. Denoising diffusion implicit models. arXiv preprint arXiv:2010.02502 (2020)."},{"key":"e_1_3_2_1_28_1","volume-title":"Sergul Aydore, Michael Kearns, and Aaron Roth.","author":"Tang Shuai","year":"2023","unstructured":"Shuai Tang, Zhiwei Steven Wu, Sergul Aydore, Michael Kearns, and Aaron Roth. 2023. Membership inference attacks on diffusion models via quantile regression. arXiv preprint arXiv:2312.05140 (2023)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3261749"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16452-1_4"},{"key":"e_1_3_2_1_31_1","unstructured":"Yixin Wu Ning Yu Zheng Li Michael Backes and Yang Zhang. 2022. Membership inference attacks against text-to-image generation models. (2022)."},{"key":"e_1_3_2_1_32_1","volume-title":"Membership Inference on Text-to-Image Diffusion Models via Conditional Likelihood Discrepancy. arXiv preprint arXiv:2405.14800","author":"Zhai Shengfang","year":"2024","unstructured":"Shengfang Zhai, Huanran Chen, Yinpeng Dong, Jiajun Li, Qingni Shen, Yansong Gao, Hang Su, and Yang Liu. 2024. Membership Inference on Text-to-Image Diffusion Models via Conditional Likelihood Discrepancy. arXiv preprint arXiv:2405.14800 (2024)."}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Catania International Airport Catania Italy","acronym":"SAC '25"},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707783","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:32Z","timestamp":1750298252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707783"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":32,"alternative-id":["10.1145\/3672608.3707783","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707783","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}