{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:15:11Z","timestamp":1730283311518,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000266","name":"NGA","doi-asserted-by":"publisher","award":["NM0476-19-C-0007"],"id":[{"id":"10.13039\/100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,29]]},"DOI":"10.1109\/milcom52596.2021.9653027","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T21:06:10Z","timestamp":1640898370000},"page":"981-986","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Leakage Avoidance with Switching Ensembles"],"prefix":"10.1109","author":[{"given":"Rauf","family":"Izmailov","sequence":"first","affiliation":[]},{"given":"Peter","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Mesterharm","sequence":"additional","affiliation":[]},{"given":"Samyadeep","family":"Basu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243855"},{"key":"ref11","article-title":"Reading digits in natural images with unsupervised feature learning","author":"netzer","year":"0","journal-title":"NIPS 2011 Workshop on Deep Learning and Unsupervised Feature Learning"},{"key":"ref12","article-title":"Semi-supervised knowledge transfer for deep learning from private training data","author":"papernot","year":"0","journal-title":"Proceedings of the International Conference on Learning Representations"},{"key":"ref13","first-page":"506","author":"nicolas","year":"2017","journal-title":"Practical black-box attacks against machine learning"},{"key":"ref14","article-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models","volume":"abs 1806 1246","author":"salem","year":"2018","journal-title":"CoRR"},{"key":"ref15","first-page":"1528","author":"sharif","year":"2016","journal-title":"Accessorize to a Crime Real and Stealthy Attacks on State-of-the-Art Face Recognition"},{"key":"ref16","article-title":"Privacy risks of explaining machine learning models","volume":"abs 1907 164","author":"shokri","year":"2019","journal-title":"CoRR"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref18","first-page":"601","article-title":"Stealing machine learning models via prediction apis","author":"tram\u00e8r","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"key":"ref4","first-page":"211?407","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref3","article-title":"Differentially private data generative models","volume":"abs 1812 2274","author":"chen","year":"2018","journal-title":"CoRR"},{"key":"ref6","article-title":"LOGAN: evaluating privacy leakage of generative models using generative adversarial networks","volume":"abs 1705 7663","author":"hayes","year":"2017","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"journal-title":"Cifar-10 (canadian institute for advanced research)","year":"2009","author":"krizhevsky","key":"ref8"},{"key":"ref7","article-title":"Billion-scale similarity search with gpus","author":"johnson","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref2","article-title":"Rauf Izmailov and Chris Mesterharm. Membership model inversion attacks for deep networks","volume":"abs 1910 4257","author":"basu","year":"2019","journal-title":"ArXiv"},{"key":"ref1","article-title":"Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers","volume":"abs 1306 4447","author":"giuseppe","year":"2013","journal-title":"CoRR"},{"journal-title":"MNIST Handwritten Digit Database","year":"2010","author":"lecun","key":"ref9"}],"event":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2021,11,29]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2021,12,2]]}},"container-title":["MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9652874\/9652880\/09653027.pdf?arnumber=9653027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T17:00:03Z","timestamp":1652202003000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9653027\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/milcom52596.2021.9653027","relation":{},"subject":[],"published":{"date-parts":[[2021,11,29]]}}}