{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:49:45Z","timestamp":1755794985520,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T00:00:00Z","timestamp":1752969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2232824"],"award-info":[{"award-number":["2232824"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,20]]},"DOI":"10.1145\/3690624.3709332","type":"proceedings-article","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T18:48:32Z","timestamp":1743792512000},"page":"413-424","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Domain Inference Attack with Concept Hierarchy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4945-7310","authenticated-orcid":false,"given":"Yuechun","family":"Gu","sequence":"first","affiliation":[{"name":"Trustworthy and Intelligent Computing Lab (TAIC), Computer Science and Electrical Engineering, University of Maryland, Baltimore County, Baltimore, Marryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7956-8355","authenticated-orcid":false,"given":"Jiajie","family":"He","sequence":"additional","affiliation":[{"name":"Trustworthy and Intelligent Computing Lab (TAIC), Computer Science and Electrical Engineering, University of Maryland, Baltimore County, Baltimore, Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9996-156X","authenticated-orcid":false,"given":"Keke","family":"Chen","sequence":"additional","affiliation":[{"name":"Trustworthy and Intelligent Computing Lab (TAIC), Computer Science and Electrical Engineering, University of Maryland, Baltimore County, Baltimore, Maryland, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,7,20]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.31033\/ijemr.10.3.23"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.563060"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v41i2.5298"},{"key":"e_1_3_2_2_4_1","first-page":"21428","article-title":"Geometric dataset distances via optimal transport","volume":"33","author":"Alvarez-Melis David","year":"2020","unstructured":"David Alvarez-Melis and Nicolo Fusi. 2020. Geometric dataset distances via optimal transport. Advances in Neural Information Processing Systems 33 (2020), 21428--21439.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCAF.2017.8344724"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"e_1_3_2_2_7_1","volume-title":"International conference on machine learning. PMLR","author":"Choquette-Choo Christopher A","year":"2021","unstructured":"Christopher A Choquette-Choo, Florian Tramer, Nicholas Carlini, and Nicolas Papernot. 2021. Label-only membership inference attacks. In International conference on machine learning. PMLR, 1964--1974."},{"key":"e_1_3_2_2_8_1","volume-title":"EMNIST: Extending MNIST to handwritten letters. In 2017 international joint conference on neural networks (IJCNN)","author":"Cohen Gregory","year":"2017","unstructured":"Gregory Cohen, Saeed Afshar, Jonathan Tapson, and Andre Van Schaik. 2017. EMNIST: Extending MNIST to handwritten letters. In 2017 international joint conference on neural networks (IJCNN). IEEE, 2921--2926."},{"key":"e_1_3_2_2_9_1","volume-title":"Storkey","author":"Darlow Luke Nicholas","year":"2018","unstructured":"Luke Nicholas Darlow, Elliot J. Crowley, Antreas Antoniou, and Amos J. Storkey. 2018. CINIC-10 is not ImageNet or CIFAR-10. CoRR abs\/1810.03505 (2018). arXiv:1810.03505 http:\/\/arxiv.org\/abs\/1810.03505"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CONISOFT52520.2021.00036"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS58070.2022.10062088"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243834"},{"key":"e_1_3_2_2_16_1","unstructured":"Alexey Grigorev. 2020. Clothing dataset (full high resolution). https:\/\/www. kaggle.com\/datasets\/agrigorev\/clothing-dataset-full. Accessed: 2020--10--21."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26663"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2275-y"},{"key":"e_1_3_2_2_19_1","volume-title":"LOGAN: Membership Inference Attacks Against Generative Models. Proceedings on Privacy Enhancing Technologies","author":"Hayes Jamie","year":"2019","unstructured":"Jamie Hayes, Luca Melis, George Danezis, and Emiliano De Cristofaro. [n. d.]. LOGAN: Membership Inference Attacks Against Generative Models. Proceedings on Privacy Enhancing Technologies 2019, 1 ([n. d.]), 133--152."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_21_1","unstructured":"Jeremy Howard. [n. d.]. ImageNETTE. https:\/\/github.com\/fastai\/imagenette\/"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3523273"},{"key":"e_1_3_2_2_23_1","volume-title":"Workshop on faces in'Real-Life'Images: detection, alignment, and recognition.","author":"Huang Gary B","year":"2008","unstructured":"Gary B Huang, Marwan Mattar, Tamara Berg, and Eric Learned-Miller. 2008. Labeled faces in the wild: A database forstudying face recognition in unconstrained environments. In Workshop on faces in'Real-Life'Images: detection, alignment, and recognition."},{"key":"e_1_3_2_2_24_1","volume-title":"Neil Zhenqiang Gong, and Yinzhi Cao","author":"Hui Bo","year":"2021","unstructured":"Bo Hui, Yuchen Yang, Haolin Yuan, Philippe Burlina, Neil Zhenqiang Gong, and Yinzhi Cao. 2021. Practical blind membership inference attack via differential comparisons. arXiv preprint arXiv:2101.01341 (2021)."},{"key":"e_1_3_2_2_25_1","volume-title":"International Journal of Engineering Trends and Technology 1 (10","author":"Ibrahim Mohd","year":"2020","unstructured":"Mohd Ibrahim, Zolidah Kasiran, and Muhammad Azizi Mohd Ariffin. 2020. API Vulnerabilities In Cloud Computing Platform: Attack And Detection. International Journal of Engineering Trends and Technology 1 (10 2020), 8--14. doi:10.14445\/ 22315381\/CATI1P202"},{"key":"e_1_3_2_2_26_1","volume-title":"International conference on machine learning. PMLR, 5345--5355","author":"Kaya Yigitcan","year":"2021","unstructured":"Yigitcan Kaya and Tudor Dumitras. 2021. When does data augmentation help with membership inference attacks?. In International conference on machine learning. PMLR, 5345--5355."},{"volume-title":"Learning Multiple Layers of Features from Tiny Images. Master's thesis","author":"Krizhevsky A","key":"e_1_3_2_2_27_1","unstructured":"A Krizhevsky. 2009. Learning Multiple Layers of Features from Tiny Images. Master's thesis, University of Tront (2009)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01156"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.124"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW59333.2023.00013"},{"key":"e_1_3_2_2_31_1","volume-title":"2018 IEEE International Conference on Electro\/Information Technology (EIT). IEEE, 0192--0197","author":"Pingle Bhargav","year":"2018","unstructured":"Bhargav Pingle, Aakif Mairaj, and Ahmad Y Javaid. 2018. Real-world man-in-themiddle (MITM) attack implementation using open source tools for instructional use. In 2018 IEEE International Conference on Electro\/Information Technology (EIT). IEEE, 0192--0197."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocaa347"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1142\/9789813207813_0027"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_2_35_1","unstructured":"Han Xiao Kashif Rasul and Roland Vollgraf. 2017. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. doi:10.48550\/ ARXIV.1708.07747"},{"volume-title":"30th USENIX security symposium (USENIX Security 21). 2687--2704.","author":"Zhang Wanrong","key":"e_1_3_2_2_36_1","unstructured":"Wanrong Zhang, Shruti Tople, and Olga Ohrimenko. 2021. Leakage of dataset properties in {Multi-Party} machine learning. In 30th USENIX security symposium (USENIX Security 21). 2687--2704."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"}],"event":{"name":"KDD '25: The 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Toronto ON Canada","acronym":"KDD '25"},"container-title":["Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709332","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690624.3709332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T15:44:34Z","timestamp":1755359074000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,20]]},"references-count":38,"alternative-id":["10.1145\/3690624.3709332","10.1145\/3690624"],"URL":"https:\/\/doi.org\/10.1145\/3690624.3709332","relation":{},"subject":[],"published":{"date-parts":[[2025,7,20]]},"assertion":[{"value":"2025-07-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}