{"id":"https://openalex.org/W4405182175","doi":"https://doi.org/10.1145/3658644.3690863","title":"Novel Privacy Attacks and Defenses Against Neural Networks","display_name":"Novel Privacy Attacks and Defenses Against Neural Networks","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405182175","doi":"https://doi.org/10.1145/3658644.3690863"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3690863","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690863","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690863","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690863","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056388810","display_name":"Sayanton V. Dibbo","orcid":"https://orcid.org/0000-0002-8461-6966"},"institutions":[{"id":"https://openalex.org/I107672454","display_name":"Dartmouth College","ror":"https://ror.org/049s0rh22","country_code":"US","type":"education","lineage":["https://openalex.org/I107672454"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sayanton V. Dibbo","raw_affiliation_strings":["Dartmouth College, Hanover, NH, USA"],"affiliations":[{"raw_affiliation_string":"Dartmouth College, Hanover, NH, USA","institution_ids":["https://openalex.org/I107672454"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5056388810"],"corresponding_institution_ids":["https://openalex.org/I107672454"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20624681,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"5113","last_page":"5115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8262616991996765},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6998118162155151},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6604844331741333},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6407361626625061},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4997122287750244},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.45904937386512756},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.4301506280899048},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.42407190799713135},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31366240978240967}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8262616991996765},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6998118162155151},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6604844331741333},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6407361626625061},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4997122287750244},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.45904937386512756},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.4301506280899048},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.42407190799713135},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31366240978240967},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3690863","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690863","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690863","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3690863","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690863","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690863","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405182175.pdf","grobid_xml":"https://content.openalex.org/works/W4405182175.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W2051267297","https://openalex.org/W2591882872","https://openalex.org/W2989885118","https://openalex.org/W3087685156","https://openalex.org/W3177170788","https://openalex.org/W3194085428","https://openalex.org/W4283156875","https://openalex.org/W4290948187","https://openalex.org/W4308642595","https://openalex.org/W4323340212","https://openalex.org/W4366667977","https://openalex.org/W4378976725","https://openalex.org/W4378977026","https://openalex.org/W4384499025","https://openalex.org/W4386211271"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3211393740","https://openalex.org/W3208049411","https://openalex.org/W3022908591","https://openalex.org/W4285706568","https://openalex.org/W4293790771"],"abstract_inverted_index":{"This":[0,75,173],"dissertation":[1],"comprises":[2],"five":[3],"papers":[4],"that":[5,204],"focus":[6,62],"on":[7,63,83,105,136],"a":[8,152],"novel":[9,42,52,89,144,153],"paradigm":[10],"of":[11,66,134,143],"privacy":[12,39,137,209],"attack,":[13,18],"i.e.,":[14,115],"model":[15,128,171],"inversion":[16],"(MI)":[17],"where":[19],"the":[20,64,70,84,123,141,190],"adversarial":[21,111],"goal":[22],"is":[23],"to":[24,79,122,188,197],"infer":[25],"or":[26],"reconstruct":[27],"training":[28,96,129,203],"samples.":[29],"In":[30],"particular,":[31],"these":[32,57,132],"works":[33],"are":[34],"aligned":[35],"with":[36,109],"investigating":[37],"MI":[38,44,67,81,90,107,147,165],"attacks,":[40],"designing":[41,139,194],"realistic":[43,48],"attacks":[45,68,82,91,108,166],"under":[46],"restricted":[47],"capabilities,":[49],"and":[50,185],"introducing":[51],"robust":[53],"defense":[54,191],"techniques":[55,196],"against":[56,146,164],"attacks.":[58,148],"At":[59],"first,":[60],"we":[61,103],"systematization":[65],"from":[69],"literature":[71],"review":[72],"(IEEE":[73,113],"CSF).":[74],"opened":[76],"up":[77],"ways":[78],"investigate":[80],"tabular":[85],"dataset.":[86],"We":[87,149],"developed":[88,151],"for":[92],"inferring":[93],"sensitive":[94,200],"private":[95],"data,":[97],"published":[98,179],"in":[99],"USENIX":[100],"Security.":[101],"Then,":[102],"worked":[104],"exploring":[106],"limited":[110],"capabilities":[112],"SaTML),":[114],"when":[116],"adversaries":[117],"do":[118],"not":[119,168],"have":[120,150],"access":[121],"same":[124],"data":[125],"distributions":[126],"as":[127],"data.":[130],"All":[131],"streams":[133],"work":[135,175],"attack":[138],"enabled":[140],"design":[142],"defenses":[145],"sparse":[154],"coding":[155],"architecture":[156],"(SCA),":[157],"which":[158],"shows":[159],"1.1-18.3":[160],"times":[161],"more":[162],"robustness":[163],"while":[167],"significantly":[169],"compromising":[170],"accuracy.":[172],"exciting":[174],"has":[176],"just":[177],"been":[178],"at":[180],"ECCV":[181],"2024":[182],"this":[183],"year":[184],"inspires":[186],"us":[187],"improve":[189],"further":[192],"by":[193],"systematic":[195],"drop":[198],"highly":[199],"features":[201],"during":[202],"can":[205],"also":[206],"provide":[207],"provable":[208],"bounds.":[210]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
