{"id":"https://openalex.org/W4308361270","doi":"https://doi.org/10.1145/3548606.3559359","title":"Auditing Membership Leakages of Multi-Exit Networks","display_name":"Auditing Membership Leakages of Multi-Exit Networks","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308361270","doi":"https://doi.org/10.1145/3548606.3559359"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3559359","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3559359","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100414995","display_name":"Zheng Li","orcid":"https://orcid.org/0009-0000-1121-0191"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Zheng Li","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001195635","display_name":"Yiyong Liu","orcid":"https://orcid.org/0000-0002-5112-2871"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Yiyong Liu","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101911145","display_name":"Xinlei He","orcid":"https://orcid.org/0000-0001-5725-2848"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Xinlei He","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029174306","display_name":"Ning Yu","orcid":"https://orcid.org/0000-0001-6084-3630"},"institutions":[{"id":"https://openalex.org/I4210155268","display_name":"Salesforce (United States)","ror":"https://ror.org/057315g56","country_code":"US","type":"company","lineage":["https://openalex.org/I4210155268"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ning Yu","raw_affiliation_strings":["Salesforce Research, Palo Alto, CA, USA"],"affiliations":[{"raw_affiliation_string":"Salesforce Research, Palo Alto, CA, USA","institution_ids":["https://openalex.org/I4210155268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004014878","display_name":"Michael Backes","orcid":"https://orcid.org/0000-0002-9326-6400"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Backes","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100354608","display_name":"Yang Zhang","orcid":"https://orcid.org/0000-0001-9229-7689"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Yang Zhang","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100414995"],"corresponding_institution_ids":["https://openalex.org/I4210128801"],"apc_list":null,"apc_paid":null,"fwci":4.1036,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.96245829,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1917","last_page":"1931"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7983418703079224},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7732974290847778},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6101747155189514},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5105408430099487},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.490225613117218},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4579213857650757},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4473230838775635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38160252571105957},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3016323447227478},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10012337565422058},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09410062432289124}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7983418703079224},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7732974290847778},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6101747155189514},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5105408430099487},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.490225613117218},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4579213857650757},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4473230838775635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38160252571105957},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3016323447227478},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10012337565422058},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09410062432289124},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3559359","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3559359","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W569478347","https://openalex.org/W1673310716","https://openalex.org/W1686810756","https://openalex.org/W1821462560","https://openalex.org/W1945616565","https://openalex.org/W2014268383","https://openalex.org/W2150593711","https://openalex.org/W2270478131","https://openalex.org/W2535690855","https://openalex.org/W2593390416","https://openalex.org/W2617174679","https://openalex.org/W2795435272","https://openalex.org/W2807096445","https://openalex.org/W2884943453","https://openalex.org/W2920031528","https://openalex.org/W2930926105","https://openalex.org/W2944701285","https://openalex.org/W2946363484","https://openalex.org/W2949866693","https://openalex.org/W2952374574","https://openalex.org/W2956128647","https://openalex.org/W2962677625","https://openalex.org/W2962953210","https://openalex.org/W2963163009","https://openalex.org/W2981884310","https://openalex.org/W2995751512","https://openalex.org/W3010833785","https://openalex.org/W3013068160","https://openalex.org/W3017722917","https://openalex.org/W3033737024","https://openalex.org/W3035030897","https://openalex.org/W3046102592","https://openalex.org/W3049640275","https://openalex.org/W3102767875","https://openalex.org/W3103245149","https://openalex.org/W3103836116","https://openalex.org/W3104224589","https://openalex.org/W3121413886","https://openalex.org/W3126787694","https://openalex.org/W3127447688","https://openalex.org/W3135535736","https://openalex.org/W3155551741","https://openalex.org/W3176694147","https://openalex.org/W3204116100","https://openalex.org/W4248987559","https://openalex.org/W6637162671","https://openalex.org/W6637551013","https://openalex.org/W6687483927","https://openalex.org/W6766152879","https://openalex.org/W6775706467","https://openalex.org/W6797406422","https://openalex.org/W6841867693"],"related_works":["https://openalex.org/W96612179","https://openalex.org/W2770234245","https://openalex.org/W2987774938","https://openalex.org/W2566006169","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W4229499248","https://openalex.org/W4378874356","https://openalex.org/W3069027545","https://openalex.org/W2582931703"],"abstract_inverted_index":{"Relying":[0],"on":[1],"the":[2,9,30,50,71,81,93],"truth":[3],"that":[4],"not":[5],"all":[6],"inputs":[7],"require":[8],"same":[10],"level":[11],"of":[12,32,49,63,99],"computational":[13],"cost":[14],"to":[15,69],"produce":[16],"reliable":[17],"predictions,":[18],"multi-exit":[19,64,103],"networks":[20,36,65],"are":[21,66],"gaining":[22],"attention":[23],"as":[24],"a":[25,38,96],"prominent":[26],"approach":[27],"for":[28,95],"pushing":[29],"limits":[31],"efficient":[33],"deployment.":[34],"Multi-exit":[35],"endow":[37],"backbone":[39],"model":[40,51],"with":[41],"early":[42],"exits,":[43],"allowing":[44],"predictions":[45],"at":[46],"intermediate":[47],"layers":[48],"and":[52,57,78],"thus":[53],"saving":[54],"computation":[55],"time":[56],"energy.":[58],"However,":[59],"various":[60],"current":[61],"designs":[62],"only":[67],"considered":[68],"achieve":[70],"best":[72],"trade-off":[73],"between":[74],"resource":[75],"usage":[76],"efficiency":[77],"prediction":[79],"accuracy,":[80],"privacy":[82,100],"risks":[83,101],"stemming":[84],"from":[85],"them":[86],"have":[87],"never":[88],"been":[89],"explored.":[90],"This":[91],"prompts":[92],"need":[94],"comprehensive":[97],"investigation":[98],"in":[102],"networks.":[104]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
