{"id":"https://openalex.org/W4413640381","doi":"https://doi.org/10.1109/csr64739.2025.11130099","title":"Machine Learning Model Complexity as a Mitigation Strategy Against Industrial Espionage through Membership Inference Attacks","display_name":"Machine Learning Model Complexity as a Mitigation Strategy Against Industrial Espionage through Membership Inference Attacks","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413640381","doi":"https://doi.org/10.1109/csr64739.2025.11130099"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130099","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054189966","display_name":"Rustem Dautov","orcid":"https://orcid.org/0000-0002-0260-6343"},"institutions":[{"id":"https://openalex.org/I4387930215","display_name":"SINTEF Digital","ror":"https://ror.org/028m52w57","country_code":null,"type":"facility","lineage":["https://openalex.org/I173888879","https://openalex.org/I4387930215"]},{"id":"https://openalex.org/I173888879","display_name":"SINTEF","ror":"https://ror.org/01f677e56","country_code":"NO","type":"facility","lineage":["https://openalex.org/I173888879"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Rustem Dautov","raw_affiliation_strings":["SINTEF Digital,Oslo,Norway"],"affiliations":[{"raw_affiliation_string":"SINTEF Digital,Oslo,Norway","institution_ids":["https://openalex.org/I173888879","https://openalex.org/I4387930215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061863093","display_name":"Hui Song","orcid":"https://orcid.org/0000-0002-0458-5136"},"institutions":[{"id":"https://openalex.org/I173888879","display_name":"SINTEF","ror":"https://ror.org/01f677e56","country_code":"NO","type":"facility","lineage":["https://openalex.org/I173888879"]},{"id":"https://openalex.org/I4387930215","display_name":"SINTEF Digital","ror":"https://ror.org/028m52w57","country_code":null,"type":"facility","lineage":["https://openalex.org/I173888879","https://openalex.org/I4387930215"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Hui Song","raw_affiliation_strings":["SINTEF Digital,Oslo,Norway"],"affiliations":[{"raw_affiliation_string":"SINTEF Digital,Oslo,Norway","institution_ids":["https://openalex.org/I173888879","https://openalex.org/I4387930215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110143248","display_name":"Christian Schaefer","orcid":null},"institutions":[{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Christian Schaefer","raw_affiliation_strings":["Ericsson AB,Stockholm,Sweden"],"affiliations":[{"raw_affiliation_string":"Ericsson AB,Stockholm,Sweden","institution_ids":["https://openalex.org/I1306339040"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081929315","display_name":"Seong-Hyun Kim","orcid":"https://orcid.org/0000-0002-6522-4203"},"institutions":[{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Seonghyun Kim","raw_affiliation_strings":["Ericsson AB,Stockholm,Sweden"],"affiliations":[{"raw_affiliation_string":"Ericsson AB,Stockholm,Sweden","institution_ids":["https://openalex.org/I1306339040"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013617841","display_name":"Verena Pietsch","orcid":"https://orcid.org/0000-0002-9146-4649"},"institutions":[{"id":"https://openalex.org/I57615478","display_name":"Mahle (Austria)","ror":"https://ror.org/0039sga55","country_code":"AT","type":"company","lineage":["https://openalex.org/I4210138662","https://openalex.org/I57615478"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Verena Pietsch","raw_affiliation_strings":["FILL GmbH,Gurten,Austria"],"affiliations":[{"raw_affiliation_string":"FILL GmbH,Gurten,Austria","institution_ids":["https://openalex.org/I57615478"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5054189966"],"corresponding_institution_ids":["https://openalex.org/I173888879","https://openalex.org/I4387930215"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12878016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"469","last_page":"475"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.7621999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.7621999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6318734288215637},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6080145835876465},{"id":"https://openalex.org/keywords/espionage","display_name":"Espionage","score":0.5684686899185181},{"id":"https://openalex.org/keywords/industrial-espionage","display_name":"Industrial espionage","score":0.45691782236099243},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4499720335006714},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44026055932044983},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3741180896759033},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.107320636510849},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.07002454996109009}],"concepts":[{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6318734288215637},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6080145835876465},{"id":"https://openalex.org/C558872910","wikidata":"https://www.wikidata.org/wiki/Q165950","display_name":"Espionage","level":2,"score":0.5684686899185181},{"id":"https://openalex.org/C99712631","wikidata":"https://www.wikidata.org/wiki/Q1160650","display_name":"Industrial espionage","level":2,"score":0.45691782236099243},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4499720335006714},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44026055932044983},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3741180896759033},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.107320636510849},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.07002454996109009}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11130099","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334322","display_name":"HORIZON EUROPE Framework Programme","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1966758453","https://openalex.org/W4391570188","https://openalex.org/W1579547586","https://openalex.org/W4248464129","https://openalex.org/W3211311949","https://openalex.org/W92903759","https://openalex.org/W3117099253","https://openalex.org/W2055221941","https://openalex.org/W1974330043","https://openalex.org/W2164445880"],"abstract_inverted_index":{"Machine":[0],"learning":[1],"(ML)":[2],"models,":[3],"particularly":[4],"in":[5,19,120,169,175],"the":[6,83,121,127,152],"context":[7],"of":[8,58,85,96,123,131,138,146],"Federated":[9],"Learning":[10],"(FL),":[11],"are":[12],"increasingly":[13],"used":[14],"to":[15,28,67,80,88,107,116],"enable":[16],"predictive":[17,172],"maintenance":[18,173],"smart":[20],"industry.":[21],"However,":[22],"as":[23],"these":[24],"models":[25,87,95],"become":[26,33],"integral":[27],"industrial":[29,100,124,177],"operations,":[30],"they":[31],"also":[32],"potential":[34,128],"targets":[35],"for":[36],"data":[37,53,102,132],"leakage":[38],"and":[39,103,140,158],"membership":[40],"inference":[41],"attacks":[42],"(MIAs).":[43],"In":[44],"this":[45,73],"paper,":[46],"we":[47,75,110],"hypothesise":[48],"that":[49],"training":[50,94],"on":[51,99,151],"multi-dimensional":[52],"(i.e.,":[54],"multiple":[55],"features":[56],"instead":[57],"a":[59,112,136,144],"single":[60],"feature)":[61],"enhances":[62],"resilience":[63],"against":[64],"MIAs":[65],"compared":[66],"simpler,":[68],"single-feature":[69],"models.":[70],"To":[71],"test":[72],"hypothesis,":[74],"design":[76,167],"an":[77],"experimental":[78],"testbed":[79],"empirically":[81],"evaluate":[82],"vulnerability":[84,106],"ML":[86],"black-box":[89],"MIAs.":[90,108],"Our":[91],"approach":[92],"involves":[93],"varying":[97],"complexity":[98],"time-series":[101],"measuring":[104],"their":[105],"Additionally,":[109],"introduce":[111],"human":[113],"expert\u2019s":[114],"perspective":[115],"contextualise":[117],"our":[118],"findings":[119],"realm":[122],"espionage,":[125],"highlighting":[126],"realworld":[129],"implications":[130],"leakage.":[133],"We":[134],"offer":[135],"set":[137],"observations":[139],"lessons":[141],"learnt":[142],"from":[143],"series":[145],"controlled":[147],"experiments,":[148],"shedding":[149],"light":[150],"trade-offs":[153],"between":[154],"model":[155],"complexity,":[156],"security,":[157],"computational":[159],"effort.":[160],"These":[161],"insights":[162],"can":[163],"help":[164],"inform":[165],"future":[166],"choices":[168],"deploying":[170],"FL-based":[171],"solutions":[174],"data-sensitive":[176],"environments.":[178]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
