{"id":"https://openalex.org/W4412876839","doi":"https://doi.org/10.1145/3711896.3737166","title":"Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?","display_name":"Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?","publication_year":2025,"publication_date":"2025-08-03","ids":{"openalex":"https://openalex.org/W4412876839","doi":"https://doi.org/10.1145/3711896.3737166"},"language":"en","primary_location":{"id":"doi:10.1145/3711896.3737166","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3711896.3737166","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3711896.3737166","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.2","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3711896.3737166","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108996912","display_name":"Likun Zhang","orcid":"https://orcid.org/0000-0001-9309-4541"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Likun Zhang","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023954841","display_name":"Hao Wu","orcid":"https://orcid.org/0000-0002-0980-9805"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Wu","raw_affiliation_strings":["National Key Lab for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"National Key Lab for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023557112","display_name":"Lingcui Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingcui Zhang","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114549816","display_name":"Fengyuan Xu","orcid":"https://orcid.org/0000-0003-3388-7544"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengyuan Xu","raw_affiliation_strings":["National Key Lab for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"National Key Lab for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101850333","display_name":"Jin Cao","orcid":"https://orcid.org/0000-0003-1372-7252"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Cao","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi'an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325259","display_name":"Fenghua Li","orcid":"https://orcid.org/0000-0003-0638-5610"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fenghua Li","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036725114","display_name":"Ben Niu","orcid":"https://orcid.org/0000-0003-2898-7495"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ben Niu","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5108996912"],"corresponding_institution_ids":["https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09183889,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3786","last_page":"3795"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/attribution","display_name":"Attribution","score":0.7316281795501709},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.638963520526886},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.5262795090675354},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42314979434013367},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3486512303352356},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.20305687189102173},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.19748041033744812},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.06655389070510864}],"concepts":[{"id":"https://openalex.org/C143299363","wikidata":"https://www.wikidata.org/wiki/Q900584","display_name":"Attribution","level":2,"score":0.7316281795501709},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.638963520526886},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.5262795090675354},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42314979434013367},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3486512303352356},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.20305687189102173},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.19748041033744812},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.06655389070510864}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3711896.3737166","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3711896.3737166","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3711896.3737166","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.2","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3711896.3737166","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3711896.3737166","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3711896.3737166","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.2","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2166296455","display_name":null,"funder_award_id":"62302207","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3184683627","display_name":null,"funder_award_id":"62432004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3431386612","display_name":null,"funder_award_id":"62332018","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G497958084","display_name":null,"funder_award_id":"K202207","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6330607538","display_name":null,"funder_award_id":"23022","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4412876839.pdf","grobid_xml":"https://content.openalex.org/works/W4412876839.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1901129140","https://openalex.org/W2535690855","https://openalex.org/W2899463613","https://openalex.org/W4214622647","https://openalex.org/W4288057780","https://openalex.org/W4312442470","https://openalex.org/W4312933868","https://openalex.org/W4386072042","https://openalex.org/W4386072220","https://openalex.org/W4386072376","https://openalex.org/W4386076098","https://openalex.org/W4388857114","https://openalex.org/W4390872151","https://openalex.org/W4392903999","https://openalex.org/W4402264472","https://openalex.org/W6600135713"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2035546108","https://openalex.org/W2376361520","https://openalex.org/W2133328864","https://openalex.org/W2093949997","https://openalex.org/W2570200690","https://openalex.org/W2389726244","https://openalex.org/W3030478661"],"abstract_inverted_index":{"The":[0,153,167],"emergence":[1],"of":[2,17,53,93,155,164,169,261,277],"text-to-image":[3,129,165],"models":[4,104],"has":[5],"recently":[6],"sparked":[7],"significant":[8],"interest,":[9],"but":[10],"the":[11,51,76,88,94,150,160,175,179,183,190,194,231,243,255,269],"attendant":[12],"is":[13,47,172],"a":[14,32,54,70,135,141,226,238,274],"looming":[15],"shadow":[16,244],"potential":[18],"infringement":[19],"by":[20,31,59,178],"violating":[21],"user":[22],"terms.":[23],"Specifically,":[24],"an":[25,122,249],"adversary":[26],"may":[27],"exploit":[28],"data":[29,58,64,125,138,171,176],"created":[30],"commercial":[33],"model":[34,111,144,181,184,192,196,228,245,271],"to":[35,49,82,182,212,223,247],"train":[36,248],"their":[37],"own":[38],"without":[39,145],"proper":[40],"authorization.":[41],"To":[42,74,116],"address":[43],"such":[44],"risk,":[45],"it":[46],"crucial":[48],"investigate":[50],"attribution":[52,126,240,250,256],"suspicious":[55,227],"model's":[56,136],"training":[57,63,89,124,137,170],"determining":[60],"whether":[61,134],"its":[62],"originates,":[65],"wholly":[66],"or":[67,90],"partially,":[68],"from":[69,140,204,230],"specific":[71,201],"source":[72,95,143,151,180,191,232],"model.":[73,96,152,233],"trace":[75],"generated":[77,177,278],"data,":[78,188],"existing":[79],"methods":[80,99,263],"need":[81],"apply":[83],"additional":[84,147],"watermarks":[85,148,222],"during":[86],"either":[87],"inference":[91],"phases":[92],"However,":[97],"these":[98,214],"are":[100,264],"impractical":[101],"for":[102,128],"pre-trained":[103],"that":[105,187,254],"have":[106],"been":[107],"released,":[108],"especially":[109],"when":[110,268],"owners":[112],"lack":[113],"security":[114],"expertise.":[115],"tackle":[117],"this":[118],"challenge,":[119],"we":[120,206,235],"propose":[121,237],"injection-free":[123],"method":[127,157],"models.":[130,166],"It":[131],"can":[132],"identify":[133],"stems":[139],"certain":[142],"adding":[146],"on":[149,186,200],"rationale":[154],"our":[156,262],"lies":[158],"in":[159],"inherent":[161,221],"memorization":[162,168],"characteristic":[163],"inherited":[173],"through":[174],"trained":[185],"making":[189],"and":[193,209,217,258],"infringing":[195,270],"exhibit":[197],"consistent":[198],"behaviors":[199],"samples.":[202],"Therefore,":[203],"instance-level,":[205],"develop":[207],"detection-based":[208],"generation-based":[210],"strategies":[211],"uncover":[213],"distinct":[215],"samples":[216],"using":[218],"them":[219],"as":[220],"verify":[224],"if":[225],"originates":[229],"Besides,":[234],"also":[236],"statistical-level":[239],"method,":[241],"utilizing":[242],"technique":[246],"discriminator.":[251],"Experiments":[252],"demonstrate":[253],"accuracy":[257],"AUC":[259],"scores":[260],"over":[265],"80%":[266],"even":[267],"only":[272],"uses":[273],"small":[275],"proportion":[276],"data.":[279]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
