{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:48:41Z","timestamp":1755794921548,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","funder":[{"name":"Science Foundation for Youths of Jiangsu Province","award":["BK20220772"],"award-info":[{"award-number":["BK20220772"]}]},{"name":"National Key R&D Program of China","award":["2023YFB3106304,"],"award-info":[{"award-number":["2023YFB3106304,"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62332018, 62432004 and 62302207"],"award-info":[{"award-number":["62332018, 62432004 and 62302207"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,3]]},"DOI":"10.1145\/3711896.3737166","type":"proceedings-article","created":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T21:07:39Z","timestamp":1754255259000},"page":"3786-3795","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9309-4541","authenticated-orcid":false,"given":"Likun","family":"Zhang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Cyberspace Security Defense, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0980-9805","authenticated-orcid":false,"given":"Hao","family":"Wu","sequence":"additional","affiliation":[{"name":"National Key Lab for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7783-3738","authenticated-orcid":false,"given":"Lingcui","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cyberspace Security Defense, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3388-7544","authenticated-orcid":false,"given":"Fengyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"National Key Lab for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1372-7252","authenticated-orcid":false,"given":"Jin","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0638-5610","authenticated-orcid":false,"given":"Fenghua","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cyberspace Security Defense, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2898-7495","authenticated-orcid":false,"given":"Ben","family":"Niu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cyberspace Security Defense, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,8,3]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proc. of USENIX Security Symposium.","author":"Adi Yossi","year":"2018","unstructured":"Yossi Adi, Carsten Baum, Moustapha Ciss\u00e9, Benny Pinkas, and Joseph Keshet. 2018. Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. In Proc. of USENIX Security Symposium."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"e_1_3_2_2_3_1","volume-title":"Proc. of USENIX Security.","author":"Carlini Nicholas","year":"2023","unstructured":"Nicholas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tram\u00e8r, Borja Balle, Daphne Ippolito, and Eric Wallace. 2023. Extracting Training Data from Diffusion Models. In Proc. of USENIX Security."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00393"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00391"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10446824"},{"key":"e_1_3_2_2_7_1","unstructured":"ImagenAI. [n.d.]. https:\/\/imagen-ai.com\/terms-of-use"},{"key":"e_1_3_2_2_8_1","volume-title":"Proc. of USENIX security.","author":"Jia Hengrui","year":"2021","unstructured":"Hengrui Jia, Christopher A Choquette-Choo, Varun Chandrasekaran, and Nicolas Papernot. 2021. Entangled watermarks as a defense against model extraction. In Proc. of USENIX security."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01354"},{"key":"e_1_3_2_2_10_1","volume-title":"Engineering","volume":"5","author":"Li Fenghua","year":"2019","unstructured":"Fenghua Li, Hui Li, Ben Niu, and Jinjun Chen. 2019. Privacy Computing: Concept, Computing Framework, and Future Development Trends. Engineering, Vol. 5, 6 (2019)."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623120"},{"key":"e_1_3_2_2_12_1","unstructured":"Yugeng Liu Zheng Li Michael Backes Yun Shen and Yang Zhang. 2023. Watermarking diffusion model. arXiv preprint arXiv:2305.12502(2023)."},{"key":"e_1_3_2_2_13_1","unstructured":"Ge Luo Junqiang Huang Manman Zhang Zhenxing Qian Sheng Li and Xinpeng Zhang. 2023. Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models. arXiv preprint arXiv:2311.13619(2023)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00099"},{"key":"e_1_3_2_2_15_1","unstructured":"MidJourney. [n.d.]. https:\/\/docs.midjourney.com\/docs\/terms-of-service"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01413"},{"key":"e_1_3_2_2_17_1","unstructured":"Aditya Ramesh Prafulla Dhariwal Alex Nichol Casey Chu and Mark Chen. 2022. Hierarchical Text-Conditional Image Generation with CLIP Latents. arXiv preprint arXiv:2204.06125(2022)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01571"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K18-3013"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00586"},{"key":"e_1_3_2_2_24_1","volume-title":"Proc. of NeurIPS.","author":"Somepalli Gowthami","year":"2023","unstructured":"Gowthami Somepalli, Vasu Singla, Micah Goldblum, Jonas Geiping, and Tom Goldstein. 2023b. Understanding and Mitigating Copying in Diffusion Models. In Proc. of NeurIPS."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Lukas Struppek Dominik Hintersdorf and Kristian Kersting. 2022. Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models. arXiv preprint arXiv:2211.02408(2022).","DOI":"10.1109\/ICCV51070.2023.00423"},{"key":"e_1_3_2_2_26_1","unstructured":"Stable-Diffusion v1 5. [n.d.]. https:\/\/huggingface.co\/runwayml\/stable-diffusion-v1-5"},{"key":"e_1_3_2_2_27_1","unstructured":"Stable-Diffusion v2 1. [n.d.]. https:\/\/huggingface.co\/stabilityai\/stable-diffusion-2-1"},{"key":"e_1_3_2_2_28_1","unstructured":"Yixin Wu Rui Wen Michael Backes Ning Yu and Yang Zhang. 2022. Model Stealing Attacks Against Vision-Language Models. (2022)."},{"key":"e_1_3_2_2_29_1","volume-title":"PRSA: Prompt Reverse Stealing Attacks against Large Language Models. arXiv","author":"Yang Yong","year":"2024","unstructured":"Yong Yang, Xuhong Zhang, Yi Jiang, Xi Chen, Haoyu Wang, Shouling Ji, and Zonghui Wang. 2024. PRSA: Prompt Reverse Stealing Attacks against Large Language Models. arXiv, Vol. abs\/2402.19200 (2024). arXiv:2402.19200"},{"key":"e_1_3_2_2_30_1","unstructured":"Yunqing Zhao Tianyu Pang Chao Du Xiao Yang Ngai-Man Cheung and Min Lin. 2023. A recipe for watermarking diffusion models. arXiv preprint arXiv:2303.10137(2023)."}],"event":{"name":"KDD '25: The 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Toronto ON Canada","acronym":"KDD '25"},"container-title":["Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711896.3737166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T14:42:51Z","timestamp":1755355371000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711896.3737166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,3]]},"references-count":30,"alternative-id":["10.1145\/3711896.3737166","10.1145\/3711896"],"URL":"https:\/\/doi.org\/10.1145\/3711896.3737166","relation":{},"subject":[],"published":{"date-parts":[[2025,8,3]]},"assertion":[{"value":"2025-08-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}