{"id":"https://openalex.org/W4387321693","doi":"https://doi.org/10.1145/3607199.3607224","title":"Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy","display_name":"Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy","publication_year":2023,"publication_date":"2023-10-03","ids":{"openalex":"https://openalex.org/W4387321693","doi":"https://doi.org/10.1145/3607199.3607224"},"language":"en","primary_location":{"id":"doi:10.1145/3607199.3607224","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3607199.3607224","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020454074","display_name":"Seung Ho Na","orcid":"https://orcid.org/0000-0003-0908-1233"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Seung Ho Na","raw_affiliation_strings":["KAIST, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0003-0908-1233","affiliations":[{"raw_affiliation_string":"KAIST, Republic of Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027199710","display_name":"Kwanwoo Kim","orcid":"https://orcid.org/0000-0002-4796-0629"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kwanwoo Kim","raw_affiliation_strings":["KAIST, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-4796-0629","affiliations":[{"raw_affiliation_string":"KAIST, Republic of Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084473174","display_name":"Seungwon Shin","orcid":"https://orcid.org/0000-0002-1077-5606"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seungwon Shin","raw_affiliation_strings":["KAIST, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-1077-5606","affiliations":[{"raw_affiliation_string":"KAIST, Republic of Korea","institution_ids":["https://openalex.org/I157485424"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020454074"],"corresponding_institution_ids":["https://openalex.org/I157485424"],"apc_list":null,"apc_paid":null,"fwci":0.1704,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5705643,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"250","last_page":"263"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6038990020751953},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5753538608551025},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5022144317626953},{"id":"https://openalex.org/keywords/erosion","display_name":"Erosion","score":0.480258971452713},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4281119704246521},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3951556086540222},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32418549060821533},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3221808075904846},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.19225603342056274},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17929860949516296},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.0656309723854065}],"concepts":[{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6038990020751953},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5753538608551025},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5022144317626953},{"id":"https://openalex.org/C123157820","wikidata":"https://www.wikidata.org/wiki/Q80026","display_name":"Erosion","level":2,"score":0.480258971452713},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4281119704246521},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3951556086540222},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32418549060821533},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3221808075904846},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.19225603342056274},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17929860949516296},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0656309723854065},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3607199.3607224","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3607199.3607224","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2004915807","https://openalex.org/W2034368206","https://openalex.org/W2047449506","https://openalex.org/W2097079088","https://openalex.org/W2143991132","https://openalex.org/W2194775991","https://openalex.org/W2535690855","https://openalex.org/W2884943453","https://openalex.org/W2930926105","https://openalex.org/W2946363484","https://openalex.org/W2983140679","https://openalex.org/W2993587506","https://openalex.org/W3071470454","https://openalex.org/W3081096564","https://openalex.org/W3102015031","https://openalex.org/W3103245149","https://openalex.org/W3104224589","https://openalex.org/W3106873467","https://openalex.org/W3115042282","https://openalex.org/W3155551741","https://openalex.org/W3159243351","https://openalex.org/W3173524712","https://openalex.org/W4311165847","https://openalex.org/W6688325169","https://openalex.org/W6785333560"],"related_works":["https://openalex.org/W2055243143","https://openalex.org/W4321636575","https://openalex.org/W1986418932","https://openalex.org/W2357796999","https://openalex.org/W2045526782","https://openalex.org/W2741131631","https://openalex.org/W2156919374","https://openalex.org/W1984019423","https://openalex.org/W4280588203","https://openalex.org/W1483472507"],"abstract_inverted_index":{"Data":[0],"drift":[1,64,76,96,125,141,158,174,233],"is":[2,13,28,134],"the":[3,6,16,21,33,48,80,86,91,161,177,217,229,236],"phenomenon":[4],"when":[5,77],"input":[7],"data":[8,63,75,95,115,124,140,157,173,203,220,232,245],"distribution":[9],"in":[10,24,129,202,215],"testing":[11],"time":[12],"different":[14],"from":[15],"training":[17],"time.":[18],"This":[19],"strengthens":[20],"generalization":[22,49],"gap":[23,50],"a":[25,52,102,150,191,196],"model,":[26],"which":[27],"known":[29],"to":[30,79,89,138,228,244],"severely":[31],"deteriorate":[32],"model\u2019s":[34],"performance.":[35],"Meanwhile,":[36],"previous":[37],"studies":[38],"state":[39],"that":[40,62,120,172,199,241],"membership":[41,98],"inference":[42],"attacks":[43],"(MIA)":[44],"take":[45],"advantage":[46],"of":[47,51,83,94,181,184,193,195,219,231,238],"machine":[53],"learning":[54],"model.":[55],"By":[56],"transitive":[57],"logic,":[58],"we":[59,73,100,188,208],"can":[60],"deduce":[61],"would":[65],"affect":[66],"these":[67],"privacy":[68,81],"attacks.":[69],"In":[70,186],"this":[71,147,206],"work,":[72],"consider":[74],"applied":[78],"threat":[82,230],"MIA.":[84],"As":[85],"first":[87],"work":[88,225],"explore":[90],"detrimental":[92],"extent":[93],"on":[97,105,166],"privacy,":[99],"conduct":[101],"literature":[103],"review":[104],"current":[106],"MIA":[107,130,143,163,197,239],"defense":[108,164,198,240],"works":[109],"under":[110],"selected":[111],"dimensions":[112],"associated":[113],"with":[114,142],"drift.":[116,204,221,246],"Our":[117],"study":[118],"reveals":[119],"not":[121],"only":[122],"has":[123],"never":[126],"been":[127],"tested":[128],"defense,":[131],"but":[132],"there":[133],"also":[135],"no":[136],"infrastructure":[137],"juxtapose":[139],"defense.":[144,185],"We":[145,222],"overcome":[146],"by":[148],"proposing":[149],"design":[151],"for":[152],"simulating":[153],"authentic":[154],"and":[155,159,234],"synthetic":[156],"evaluate":[160],"benchmark":[162],"methods":[165],"various":[167],"settings.":[168],"The":[169],"evaluation":[170],"shows":[171],"strongly":[175],"enhances":[176],"attack":[178],"success":[179],"rate":[180],"MIA,":[182],"regardless":[183],"this,":[187],"propose":[189],"MIAdapt,":[190],"proof":[192],"concept":[194],"allows":[200],"update":[201],"From":[205],"evaluation,":[207],"provide":[209],"security":[210],"insight":[211],"into":[212],"possible":[213],"solutions":[214],"negating":[216],"effects":[218],"hope":[223],"our":[224],"brings":[226],"attention":[227],"instigates":[235],"development":[237],"are":[242],"adaptable":[243]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
