{"id":"https://openalex.org/W7134974675","doi":"https://doi.org/10.1007/s10207-026-01230-4","title":"Protection of the CGAN against membership inference attack using Differential Privacy","display_name":"Protection of the CGAN against membership inference attack using Differential Privacy","publication_year":2026,"publication_date":"2026-03-11","ids":{"openalex":"https://openalex.org/W7134974675","doi":"https://doi.org/10.1007/s10207-026-01230-4"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-026-01230-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01230-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01230-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01230-4.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001703116","display_name":"Ala Ekramifard","orcid":null},"institutions":[{"id":"https://openalex.org/I86958956","display_name":"Ferdowsi University of Mashhad","ror":"https://ror.org/00g6ka752","country_code":"IR","type":"education","lineage":["https://openalex.org/I86958956"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ala Ekramifard","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran","institution_ids":["https://openalex.org/I86958956"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024201764","display_name":"Haleh Amintoosi","orcid":"https://orcid.org/0000-0002-1447-8086"},"institutions":[{"id":"https://openalex.org/I86958956","display_name":"Ferdowsi University of Mashhad","ror":"https://ror.org/00g6ka752","country_code":"IR","type":"education","lineage":["https://openalex.org/I86958956"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Haleh Amintoosi","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran","institution_ids":["https://openalex.org/I86958956"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001755097","display_name":"Seyed Amin Hosseini Seno","orcid":"https://orcid.org/0000-0002-0838-1800"},"institutions":[{"id":"https://openalex.org/I86958956","display_name":"Ferdowsi University of Mashhad","ror":"https://ror.org/00g6ka752","country_code":"IR","type":"education","lineage":["https://openalex.org/I86958956"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Seyed Amin Hosseini Seno","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran","institution_ids":["https://openalex.org/I86958956"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024201764"],"corresponding_institution_ids":["https://openalex.org/I86958956"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.92056302,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.7318000197410583,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.7318000197410583,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.08579999953508377,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.04659999907016754,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.679099977016449},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5368000268936157},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5327000021934509},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5188999772071838},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.38920000195503235},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3555999994277954}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8021000027656555},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.679099977016449},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6172000169754028},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5368000268936157},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5327000021934509},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5188999772071838},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.38920000195503235},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3741999864578247},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3555999994277954},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.320499986410141},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2980000078678131},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.29600000381469727},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.2847000062465668}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-026-01230-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01230-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01230-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-026-01230-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01230-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01230-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5529224276542664}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7134974675.pdf","grobid_xml":"https://content.openalex.org/works/W7134974675.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1557833142","https://openalex.org/W2167372639","https://openalex.org/W2473418344","https://openalex.org/W2535690855","https://openalex.org/W2594311007","https://openalex.org/W2884943453","https://openalex.org/W2887995258","https://openalex.org/W2910022251","https://openalex.org/W2911915417","https://openalex.org/W2952046647","https://openalex.org/W2955364291","https://openalex.org/W2961396908","https://openalex.org/W2963378725","https://openalex.org/W2967880504","https://openalex.org/W3037024166","https://openalex.org/W3096831136","https://openalex.org/W3133489863","https://openalex.org/W3162152546","https://openalex.org/W3177624059","https://openalex.org/W4200366874","https://openalex.org/W4205228770","https://openalex.org/W4294234213","https://openalex.org/W4306663569","https://openalex.org/W4321321579","https://openalex.org/W4396856300","https://openalex.org/W4399938093","https://openalex.org/W4410114628"],"related_works":[],"abstract_inverted_index":{"Machine":[0],"learning":[1,28],"has":[2],"been":[3],"widely":[4,41],"applied":[5],"in":[6,43,90,97],"various":[7],"fields,":[8],"including":[9],"image":[10,46],"and":[11,17,52,62,87,105,126,136,149,168],"speech":[12],"recognition,":[13],"natural":[14],"language":[15],"processing,":[16],"data":[18,33,53,104],"synthesis.":[19],"Generative":[20],"Adversarial":[21],"Networks":[22],"are":[23,40],"a":[24],"type":[25],"of":[26,134],"deep":[27],"model":[29],"designed":[30],"to":[31,56,59,145,186],"generate":[32,101],"that":[34,113,161],"closely":[35],"resembles":[36],"real-world":[37],"data.":[38,64],"GANs":[39,66],"used":[42],"areas":[44],"like":[45],"synthesis,":[47],"video":[48],"game":[49],"development,":[50],"healthcare,":[51],"augmentation":[54],"due":[55],"their":[57,79],"ability":[58],"create":[60,150],"realistic":[61,167],"varied":[63],"However,":[65],"also":[67],"raise":[68],"privacy":[69,143,147,175],"concerns,":[70],"as":[71],"they":[72],"may":[73],"inadvertently":[74],"expose":[75],"sensitive":[76],"information":[77],"from":[78],"training":[80],"data,":[81,171],"sparking":[82],"discussions":[83],"around":[84],"ethical":[85],"use":[86,133],"privacy-preserving":[88],"methods":[89],"AI.":[91],"To":[92],"deal":[93],"membership":[94],"inference":[95],"attacks":[96],"conditional":[98],"GANs,":[99],"which":[100],"both":[102],"synthetic":[103,151,170],"corresponding":[106],"labels,":[107],"we":[108],"introduce":[109],"three":[110],"new":[111],"models":[112,121,163],"achieve":[114],"acceptable":[115],"accuracy":[116,180],"while":[117],"preserving":[118],"privacy.":[119],"These":[120],"employ":[122,139],"an":[123],"adaptive":[124],"perturbation":[125],"clipping":[127],"technique,":[128],"further":[129],"improved":[130],"through":[131],"the":[132,140],"normalization":[135],"dropout.":[137],"We":[138],"Renyi":[141],"differential":[142],"accountant":[144],"monitor":[146],"loss":[148],"samples":[152],"along":[153],"with":[154],"its":[155],"matching":[156],"labels.":[157],"Our":[158],"evaluations":[159],"demonstrate":[160],"these":[162],"can":[164],"produce":[165],"highly":[166],"accurate":[169],"even":[172],"under":[173],"strict":[174],"protection.":[176],"On":[177],"average,":[178],"attack":[179],"is":[181],"reduced":[182],"by":[183],"0.01":[184],"compared":[185],"similar":[187],"methods.":[188]},"counts_by_year":[],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2026-03-12T00:00:00"}
