{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:46:12Z","timestamp":1768016772838,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1145\/3696410.3714602","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:52:18Z","timestamp":1745362338000},"page":"2500-2513","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["ArtistAuditor: Auditing Artist Style Pirate in Text-to-Image Generation Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9028-9326","authenticated-orcid":false,"given":"Linkang","family":"Du","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5268-9667","authenticated-orcid":false,"given":"Zheng","family":"Zhu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China and The Chinese University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1128-7989","authenticated-orcid":false,"given":"Min","family":"Chen","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2875-0458","authenticated-orcid":false,"given":"Zhou","family":"Su","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4268-372X","authenticated-orcid":false,"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4221-2162","authenticated-orcid":false,"given":"Peng","family":"Cheng","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3155-3145","authenticated-orcid":false,"given":"Jiming","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China and Hangzhou Dianzi University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7208-3392","authenticated-orcid":false,"given":"Zhikun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ArXiv","author":"Cao B.","year":"2023","unstructured":"B. Cao, C. Li, T.Wang, J. Jia, B. Li, and J. Chen. IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI. ArXiv, 2023."},{"key":"e_1_3_2_1_2_1","volume-title":"ACM CCS","author":"Chen D.","year":"2019","unstructured":"D. Chen, N. Yu, Y. Zhang, and M. Fritz. Gan-leaks: A taxonomy of membership inference attacks against generative models. In ACM CCS, 2019."},{"key":"e_1_3_2_1_3_1","author":"Chen J.","year":"2023","unstructured":"J. Chen, J. Wang, X. Ma, Y. Sun, J. Sun, P. Zhang, and P. Cheng. QuoTe: Qualityoriented Testing for Deep Learning Systems. ACM Transactions on Software Engineering and Methodology, 2023.","journal-title":"QuoTe: Qualityoriented Testing for Deep Learning Systems. ACM Transactions on Software Engineering and Methodology"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX Security","author":"Chen M.","year":"2023","unstructured":"M. Chen, Z. Zhang, T. Wang, M. Backes, and Y. Zhang. FACE-AUDITOR: Data Auditing in Facial Recognition Systems. In USENIX Security, 2023."},{"key":"e_1_3_2_1_5_1","volume-title":"ArXiv","author":"Chen R.","year":"2023","unstructured":"R. Chen, H. Jin, J. Chen, and L. Sun. EditShield: Protecting Unauthorized Image Editing by Instruction-guided Diffusion Models. ArXiv, 2023."},{"key":"e_1_3_2_1_6_1","volume-title":"ACM CCS","author":"Chen X.","year":"2024","unstructured":"X. Chen, S. Tang, et al. The janus tnterface: How fine-tuning in large language models amplifies the privacy risks. In ACM CCS, 2024."},{"key":"e_1_3_2_1_7_1","volume-title":"What the Heck is Civitai? https:\/\/civitai.com\/content\/guides\/what-iscivitai","author":"CIVITAI.","year":"2022","unstructured":"CIVITAI. What the Heck is Civitai? https:\/\/civitai.com\/content\/guides\/what-iscivitai, 2022."},{"key":"e_1_3_2_1_8_1","volume-title":"ArXiv","author":"Cohen J. M.","year":"2019","unstructured":"J. M. Cohen, E. Rosenfeld, and J. Z. Kolter. Certified Adversarial Robustness via Randomized Smoothing. ArXiv, 2019."},{"key":"e_1_3_2_1_9_1","author":"Creswell A.","year":"2017","unstructured":"A. Creswell, T. White, V. Dumoulin, K. Arulkumaran, B. Sengupta, and A. A. Bharath. Generative Adversarial Networks: An Overview. IEEE Signal Processing Magazine, 2017.","journal-title":"Generative Adversarial Networks: An Overview. IEEE Signal Processing Magazine"},{"key":"e_1_3_2_1_10_1","volume-title":"ArXiv","author":"Cui Y.","year":"2023","unstructured":"Y. Cui, J. Ren, Y. Lin, H. Xu, P. He, Y. Xing,W. Fan, H. Liu, and J. Tang. FT-Shield: A Watermark Against Unauthorized Fine-tuning in Text-to-Image Diffusion Models. ArXiv, 2023."},{"key":"e_1_3_2_1_11_1","volume-title":"ArXiv","author":"Cui Y.","year":"2023","unstructured":"Y. Cui, J. Ren, H. Xu, P. He, H. Liu, L. Sun, and J. Tang. DiffusionShield: A Watermark for Copyright Protection against Generative Diffusion Models. ArXiv, 2023."},{"key":"e_1_3_2_1_12_1","volume-title":"ORL-Auditor: Dataset Auditing in Offline Deep Reinforcement Learning","author":"Du L.","year":"2024","unstructured":"L. Du, M. Chen, M. Sun, S. Ji, P. Cheng, J. Chen, and Z. Zhang. ORL-Auditor: Dataset Auditing in Offline Deep Reinforcement Learning. In NDSS. Internet Society, 2024."},{"key":"e_1_3_2_1_13_1","volume-title":"SoK: Dataset Copyright Auditing in Machine Learning Systems","author":"Du L.","year":"2025","unstructured":"L. Du, X. Zhou, M. Chen, C. Zhang, Z. Su, P. Cheng, J. Chen, and Z. Zhang. SoK: Dataset Copyright Auditing in Machine Learning Systems. In IEEE S&P, 2025."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/aiscc.2024.23009"},{"key":"e_1_3_2_1_15_1","volume-title":"ArXiv","author":"Duan J.","year":"2023","unstructured":"J. Duan, F. Kong, S. Wang, X. Shi, and K. Xu. Are Diffusion Models Vulnerable to Membership Inference Attacks? ArXiv, 2023."},{"key":"e_1_3_2_1_16_1","volume-title":"ArXiv","author":"Dziugaite G. K.","year":"2016","unstructured":"G. K. Dziugaite, Z. Ghahramani, and D. M. Roy. A Study of the Effect of JPG Compression on Adversarial Images. ArXiv, 2016."},{"key":"e_1_3_2_1_17_1","volume-title":"ArXiv","author":"Fu W.","year":"2023","unstructured":"W. Fu, H. Wang, C. Gao, G. Liu, Y. Li, and T. Jiang. A Probabilistic Fluctuation based Membership Inference Attack for Diffusion Models. ArXiv, 2023."},{"key":"e_1_3_2_1_18_1","volume-title":"ICLR","author":"Gal R.","year":"2022","unstructured":"R. Gal, Y. Alaluf, Y. Atzmon, O. Patashnik, A. H. Bermano, G. Chechik, and D. Cohen-or. An Image is Worth One Word: Personalizing Text-to-Image Generation using Textual Inversion. In ICLR, 2022."},{"key":"e_1_3_2_1_19_1","volume-title":"ArXiv","author":"Gatys L. A.","year":"2015","unstructured":"L. A. Gatys, A. S. Ecker, and M. Bethge. A Neural Algorithm of Artistic Style. ArXiv, 2015."},{"key":"e_1_3_2_1_20_1","volume-title":"Communications of the ACM","author":"Goodfellow I. J.","year":"2014","unstructured":"I. J. Goodfellow, J. Pouget-Abadie, et al. Generative Adversarial Networks. Communications of the ACM, 2014."},{"key":"e_1_3_2_1_21_1","volume-title":"CVPR","author":"He K.","year":"2015","unstructured":"K. He, X. Zhang, S. Ren, and J. Sun. Deep Residual Learning for Image Recognition. In CVPR, 2015."},{"key":"e_1_3_2_1_22_1","volume-title":"Tokenized","author":"Heidorn C.","year":"2023","unstructured":"C. Heidorn. Mind-Boggling Midjourney Statistics in 2023. Tokenized, 2023."},{"key":"e_1_3_2_1_23_1","volume-title":"ICLR","author":"Hu E. J.","year":"2021","unstructured":"E. J. Hu, P. Wallis, Z. Allen-Zhu, Y. Li, S. Wang, L. Wang, W. Chen, et al. LoRA: Low-Rank Adaptation of Large Language Models. In ICLR, 2021."},{"key":"e_1_3_2_1_24_1","volume-title":"Loss and Likelihood Based Membership Inference of Diffusion Models. In International Conference on Information Security","author":"Hu H.","year":"2023","unstructured":"H. Hu and J. Pang. Loss and Likelihood Based Membership Inference of Diffusion Models. In International Conference on Information Security, 2023."},{"key":"e_1_3_2_1_25_1","volume-title":"Midjourney v4: An Incredible New Version of the AI Image Generator","author":"Ivanenko N.","year":"2022","unstructured":"N. Ivanenko. Midjourney v4: An Incredible New Version of the AI Image Generator, 2022."},{"key":"e_1_3_2_1_26_1","volume-title":"ArXiv","author":"Kandpal N.","year":"2023","unstructured":"N. Kandpal, K. Pillutla, A. Oprea, P. Kairouz, C. A. Choquette-Choo, and Z. Xu. User Inference Attacks on Large Language Models. ArXiv, 2023."},{"key":"e_1_3_2_1_27_1","volume-title":"NeurIPS","author":"Karras T.","year":"2021","unstructured":"T. Karras, M. Aittala, S. Laine, E. H\u00e4rk\u00f6nen, J. Hellsten, J. Lehtinen, and T. Aila. Alias-Free Generative Adversarial Networks. In NeurIPS, 2021."},{"key":"e_1_3_2_1_28_1","volume-title":"Literature Survey on Impulse Noise Reduction. Signal & Image Processing : An International Journal","author":"Koli M. A.","year":"2013","unstructured":"M. A. Koli and B. S. Literature Survey on Impulse Noise Reduction. Signal & Image Processing : An International Journal, 2013."},{"key":"e_1_3_2_1_29_1","volume-title":"ArXiv","author":"Kong F.","year":"2023","unstructured":"F. Kong, J. Duan, R. Ma, H. Shen, X. lan Zhu, X. Shi, and K. Xu. An efficient membership inference attack for the diffusion model by proximal initialization. ArXiv, 2023."},{"key":"e_1_3_2_1_30_1","volume-title":"Communications of the ACM","author":"Krizhevsky A.","year":"2012","unstructured":"A. Krizhevsky, I. Sutskever, and G. E. Hinton. ImageNet Classification with Deep Convolutional Neural Networks. Communications of the ACM, 2012."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00192"},{"key":"e_1_3_2_1_32_1","volume-title":"Neurocomputing","author":"Li H.","year":"2021","unstructured":"H. Li, Y. Yang, M. Chang, H. Feng, Z. hai Xu, Q. Li, and Y. ting Chen. SRDiff: Single Image Super-Resolution with Diffusion Probabilistic Models. Neurocomputing, 2021."},{"key":"e_1_3_2_1_33_1","volume-title":"ICML","author":"Li J.","year":"2022","unstructured":"J. Li, D. Li, et al. BLIP: Bootstrapping Language-Image Pre-training for Unified Vision-Language Understanding and Generation. In ICML, 2022."},{"key":"e_1_3_2_1_34_1","volume-title":"ArXiv","author":"Liao P.","year":"2022","unstructured":"P. Liao, X. Li, X. Liu, and K. Keutzer. The ArtBench Dataset: Benchmarking Generative Models with Artworks. ArXiv, 2022."},{"key":"e_1_3_2_1_35_1","volume-title":"The World's Smartest Artificial Intelligence Just Made Its First Magazine Cover. Cosmopolitan","author":"Liu G.","year":"2022","unstructured":"G. Liu. The World's Smartest Artificial Intelligence Just Made Its First Magazine Cover. Cosmopolitan, 2022."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3447235"},{"key":"e_1_3_2_1_37_1","volume-title":"ArXiv","author":"Liu P.","year":"2023","unstructured":"P. Liu, J. Liu, et al. How ChatGPT is Solving Vulnerability Management Problem. ArXiv, 2023."},{"key":"e_1_3_2_1_38_1","volume-title":"ArXiv","author":"Luo G.","year":"2023","unstructured":"G. Luo, J. Huang, M. Zhang, Z. Qian, S. Li, and X. Zhang. Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models. ArXiv, 2023."},{"key":"e_1_3_2_1_39_1","volume-title":"ArXiv","author":"Ma Y.","year":"2023","unstructured":"Y. Ma, Z. Zhao, X. He, Z. Li, M. Backes, and Y. Zhang. Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis. ArXiv, 2023."},{"key":"e_1_3_2_1_40_1","unstructured":"V. Madan H. Hotz and X. Ma. Fine-tune Text-to-image Stable Diffusion Models with Amazon SageMaker JumpStart. https:\/\/aws.amazon.com\/blogs\/machinelearning\/fine-tune-text-to-image-stable-diffusion-models-with-amazonsagemaker-jumpstart\/i 2023."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW59333.2023.00013"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627106.3627179"},{"key":"e_1_3_2_1_43_1","volume-title":"ArXiv","author":"Pang Y.","year":"2023","unstructured":"Y. Pang and T. Wang. Black-box Membership Inference Attacks against Finetuned Diffusion Models. ArXiv, 2023."},{"key":"e_1_3_2_1_44_1","volume-title":"ArXiv","author":"Pang Y.","year":"2023","unstructured":"Y. Pang, T. Wang, X. Kang, M. Huai, and Y. Zhang. White-box Membership Inference Attacks against Diffusion Models. ArXiv, 2023."},{"key":"e_1_3_2_1_45_1","volume-title":"ArXiv","author":"Podell D.","year":"2023","unstructured":"D. Podell, Z. English, K. Lacey, A. Blattmann, T. Dockhorn, J. Muller, J. Penna, and R. Rombach. SDXL: Improving Latent Diffusion Models for High-Resolution Image Synthesis. ArXiv, 2023."},{"key":"e_1_3_2_1_46_1","volume-title":"Artists Are Not Happy About It. https:\/\/time.com\/6240569\/ai-childrens-book-alice-and-sparkleartists-unhappy\/","author":"Popli N.","year":"2022","unstructured":"N. Popli. He Used AI to Publish a Children's Book in a Weekend. Artists Are Not Happy About It. https:\/\/time.com\/6240569\/ai-childrens-book-alice-and-sparkleartists-unhappy\/, 2022."},{"key":"e_1_3_2_1_47_1","volume-title":"ICML","author":"Radford A.","year":"2021","unstructured":"A. Radford, J. W. Kim, et al. Learning Transferable Visual Models From Natural Language Supervision. In ICML, 2021."},{"key":"e_1_3_2_1_48_1","volume-title":"ICML","author":"Ramesh A.","year":"2021","unstructured":"A. Ramesh, M. Pavlov, et al. Zero-Shot Text-to-Image Generation. In ICML, 2021."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-demo.25"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_51_1","volume-title":"Artists Aren't Happy. https:\/\/www.nytimes.com\/2022\/09\/02\/technology\/ai-artificial-intelligen ce-artists.html","author":"Roose K.","year":"2022","unstructured":"K. Roose. An A.I.-Generated Picture Won an Art Prize. Artists Aren't Happy. https:\/\/www.nytimes.com\/2022\/09\/02\/technology\/ai-artificial-intelligen ce-artists.html, 2022."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02155"},{"key":"e_1_3_2_1_53_1","volume-title":"AI-generated Aame Assets. https:\/\/www.scenario.gg\/","year":"2022","unstructured":"Scenario.gg. AI-generated Aame Assets. https:\/\/www.scenario.gg\/, 2022."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_55_1","volume-title":"NeurIPS","author":"Schuhmann C.","year":"2022","unstructured":"C. Schuhmann, R. Beaumont, et al. Laion-5b: An Open Large-scale Dataset for Training Next Generation Image-text Models. In NeurIPS, 2022."},{"key":"e_1_3_2_1_56_1","volume-title":"USENIX Security","author":"Shan S.","year":"2023","unstructured":"S. Shan, J. Cryan, E. Wenger, H. Zheng, R. Hanocka, and B. Y. Zhao. GLAZE: Protecting Artists from Style Mimicry by Text-to-Image Models. In USENIX Security, 2023."},{"key":"e_1_3_2_1_57_1","volume-title":"ArXiv","author":"Shan S.","year":"2023","unstructured":"S. Shan, W. Ding, J. Passananti, H. Zheng, and B. Y. Zhao. Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models. ArXiv, 2023."},{"key":"e_1_3_2_1_58_1","volume-title":"Membership Inference Attacks Against Machine Learning Models","author":"Shokri R.","year":"2016","unstructured":"R. Shokri, M. Stronati, C. Song, and V. Shmatikov. Membership Inference Attacks Against Machine Learning Models. In IEEE S&P, 2016."},{"key":"e_1_3_2_1_59_1","volume-title":"Investigating Data Replication in Diffusion Models. In CVPR","author":"Somepalli G.","year":"2023","unstructured":"G. Somepalli, V. Singla, et al. Diffusion Art or Digital Forgery? Investigating Data Replication in Diffusion Models. In CVPR, 2023."},{"key":"e_1_3_2_1_60_1","volume-title":"Stable Diffusion v2.1 and DreamStudio Updates 7-Dec 22","author":"Stability","year":"2022","unstructured":"Stability AI. Stable Diffusion v2.1 and DreamStudio Updates 7-Dec 22, 2022. https:\/\/stability.ai\/blog\/stablediffusion2--1-release7-dec-2022."},{"key":"e_1_3_2_1_61_1","volume-title":"CVPR","author":"Szegedy C.","year":"2014","unstructured":"C. Szegedy, W. Liu, et al. Going Deeper with Convolutions. In CVPR, 2014."},{"key":"e_1_3_2_1_62_1","author":"Tan W. R.","year":"2019","unstructured":"W. R. Tan, C. S. Chan, H. Aguirre, and K. Tanaka. Improved ArtGAN for Conditional Synthesis of Natural Image and Artwork. IEEE Transactions on Image Processing, 2019.","journal-title":"IEEE Transactions on Image Processing"},{"key":"e_1_3_2_1_63_1","volume-title":"ICCV","author":"Le T. Van","year":"2023","unstructured":"T. Van Le, H. Phung, T. H. Nguyen, Q. Dao, N. N. Tran, and A. Tran. Anti-DreamBooth: Protecting Users from Personalized Text-to-image Synthesis. In ICCV, 2023."},{"key":"e_1_3_2_1_64_1","volume-title":"Diffusers: State-of-the-art diffusion models. https:\/\/github.com\/huggingface\/diffusers","author":"von Platen P.","year":"2022","unstructured":"P. von Platen, S. Patil, A. Lozhkov, P. Cuenca, N. Lambert, K. Rasul, M. Davaadorj, and T. Wolf. Diffusers: State-of-the-art diffusion models. https:\/\/github.com\/huggingface\/diffusers, 2022."},{"key":"e_1_3_2_1_65_1","volume-title":"Making Watermark Survive Model Extraction Attacks in Graph Neural Networks. In IEEE International Conference on Communications","author":"Wang H.","year":"2023","unstructured":"H. Wang, Z. Zhang, M. Chen, and S. He. Making Watermark Survive Model Extraction Attacks in Graph Neural Networks. In IEEE International Conference on Communications, 2023."},{"key":"e_1_3_2_1_66_1","author":"Wang K.","year":"2023","unstructured":"K. Wang, J. Wang, C. M. Poskitt, X. Chen, J. Sun, and P. Cheng. K-ST: A Formal Executable Semantics of the Structured Text Language for PLCs. IEEE Transactions on Software Engineering, 2023.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_67_1","volume-title":"USENIX Security","author":"Wang L.","year":"2024","unstructured":"L. Wang, J. Wang, J. Wan, L. Long, Z. Yang, and Z. Qin. Property existence inference against generative models. In USENIX Security, 2024."},{"key":"e_1_3_2_1_68_1","volume-title":"ICLR","author":"Wang Z.","year":"2023","unstructured":"Z. Wang, C. Chen, L. Lyu, D. N. Metaxas, and S. Ma. Diagnosis: Detecting Unauthorized Data Usages in Text-to-image Diffusion Models. In ICLR, 2023."},{"key":"e_1_3_2_1_69_1","volume-title":"ArXiv","author":"Wang Z.","year":"2024","unstructured":"Z.Wang, R. Zhu, et al. DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-training. ArXiv, 2024."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.23238"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616593"},{"key":"e_1_3_2_1_72_1","volume-title":"USENIX Security","author":"Yuan Q.","year":"2023","unstructured":"Q. Yuan, Z. Zhang, L. Du, M. Chen, P. Cheng, and M. Sun. PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information. In USENIX Security, 2023."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00477"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528233.3530736"},{"key":"e_1_3_2_1_75_1","volume-title":"ArXiv","author":"Zhao Z.","year":"2023","unstructured":"Z. Zhao, J. Duan, K. Xu, C.Wang, R. Guo, and X. Hu. Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion? ArXiv, 2023."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690373"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3269919"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714602","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:34Z","timestamp":1750295914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714602"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":77,"alternative-id":["10.1145\/3696410.3714602","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714602","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}