{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T15:17:04Z","timestamp":1722525424507},"reference-count":12,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1587\/transinf.2022ngl0001","type":"journal-article","created":{"date-parts":[[2022,10,31]],"date-time":"2022-10-31T22:21:11Z","timestamp":1667254871000},"page":"1911-1915","source":"Crossref","is-referenced-by-count":2,"title":["Toward Selective Membership Inference Attack against Deep Learning Model"],"prefix":"10.1587","volume":"E105.D","author":[{"given":"Hyun","family":"KWON","sequence":"first","affiliation":[{"name":"Department of Artificial Intelligence and Data Science, Korea Military Academy"}]},{"given":"Yongchul","family":"KIM","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Korea Military Academy"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] R. Shokri, M. Stronati, C. Song, and V. Shmatikov, \u201cMembership inference attacks against machine learning models,\u201d 2017 IEEE Symposium on Security and Privacy (SP), pp.3-18, IEEE, 2017. 10.1109\/sp.2017.41","DOI":"10.1109\/SP.2017.41"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] N. Homer, S. Szelinger, M. Redman, D. Duggan, W. Tembe, J. Muehling, J.V. Pearson, D.A. Stephan, S.F. Nelson, and D.W. Craig, \u201cResolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays,\u201d PLoS genetics, vol.4, no.8, 2008. 10.1371\/journal.pgen.1000167","DOI":"10.1371\/journal.pgen.1000167"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] M. Backes, P. Berrang, M. Humbert, and P. Manoharan, \u201cMembership privacy in microrna-based studies,\u201d Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.319-330, 2016. 10.1145\/2976749.2978355","DOI":"10.1145\/2976749.2978355"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] I. Hagestedt, Y. Zhang, M. Humbert, P. Berrang, H. Tang, X. Wang, and M. Backes, \u201cMbeacon: Privacy-preserving beacons for dna methylation data,\u201d NDSS, 2019. 10.14722\/ndss.2019.23064","DOI":"10.14722\/ndss.2019.23064"},{"key":"5","unstructured":"[5] A. Sundararaj and G. Kul, \u201cImpact analysis of training data characteristics for phishing email classification,\u201d Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol.12, pp.85-98, 2021."},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] V. Sihag, M. Vardhan, P. Singh, G. Choudhary, and S. Son, \u201cDe-lady: Deep learning based android malware detection using dynamic features,\u201d Journal of Internet Services and Information Security (JISIS), vol.11, no.2, pp.34-45, 2021.","DOI":"10.1155\/2021\/9099476"},{"key":"7","unstructured":"[7] P. Nowakowski, P. \u017b\u00f3rawski, K. Cabaj, and W. Mazurczyk, \u201cDetecting network covert channels using machine learning, data mining and hierarchical organisation of frequent sets,\u201d Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol.12, no.1, pp.20-43, March 2021."},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] M. Nasr, R. Shokri, and A. Houmansadr, \u201cComprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning,\u201d 2019 IEEE Symposium on Security and Privacy (SP), pp.739-753, IEEE, 2019. 10.1109\/sp.2019.00065","DOI":"10.1109\/SP.2019.00065"},{"key":"9","unstructured":"[9] J. Hayes, L. Melis, G. Danezis, and E. De Cristofaro, \u201cLogan: evaluating privacy leakage of generative models using generative adversarial networks,\u201d arXiv preprint arXiv:1705.07663, 2017."},{"key":"10","unstructured":"[10] Y. LeCun, C. Cortes, and C.J. Burges, \u201cMnist handwritten digit database,\u201d AT&amp;T Labs, http:\/\/yann.lecun.com\/exdb\/mnist, vol.2, 2010."},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] R. Greiner, \u201cPalo: A probabilistic hill-climbing algorithm,\u201d Artificial Intelligence, vol.84, no.1-2, pp.177-208, 1996. 10.1016\/0004-3702(95)00040-2","DOI":"10.1016\/0004-3702(95)00040-2"},{"key":"12","unstructured":"[12] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, \u201cGenerative adversarial nets,\u201d Advances in Neural Information Processing Systems, pp.2672-2680, 2014."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/11\/E105.D_2022NGL0001\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,5]],"date-time":"2022-11-05T04:09:41Z","timestamp":1667621381000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/11\/E105.D_2022NGL0001\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":12,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2022ngl0001","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]},"article-number":"2022NGL0001"}}