{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:39:30Z","timestamp":1730324370235,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","funder":[{"name":"UK EPSRC within the CHIST-ERA program","award":["(grant no. EP\/T023600\/1)"]},{"name":"European Research Council (ERC)","award":["BEACON (no. 677854)"]},{"name":"JPMorgan Chase & Co","award":["J.P. Morgan A.I. Research Award 2019."]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484533","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T17:05:34Z","timestamp":1636823134000},"page":"825-844","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs"],"prefix":"10.1145","author":[{"given":"Mohammad","family":"Malekzadeh","sequence":"first","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"given":"Anastasia","family":"Borovykh","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"given":"Deniz","family":"G\u00fcnd\u00fcz","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Deep Learning With Differential Privacy. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Abadi Martin","year":"2016","unstructured":"Martin Abadi , Andy Chu , Ian Goodfellow , H Brendan McMahan , Ilya Mironov , Kunal Talwar , and Li Zhang . 2016 . Deep Learning With Differential Privacy. In ACM SIGSAC Conference on Computer and Communications Security (CCS). Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep Learning With Differential Privacy. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339819"},{"key":"e_1_3_2_1_3_1","volume-title":"John L Burns, Celi, et al.","author":"Banerjee Imon","year":"2021","unstructured":"Imon Banerjee , Ananth Reddy Bhimireddy , John L Burns, Celi, et al. 2021 . Reading Race : AI Recognises Patient's Racial Identity in Medical Images . arXiv:2107.10356 (2021). Imon Banerjee, Ananth Reddy Bhimireddy, John L Burns, Celi, et al. 2021. Reading Race: AI Recognises Patient's Racial Identity in Medical Images. arXiv:2107.10356 (2021)."},{"key":"e_1_3_2_1_4_1","volume-title":"Perfect Privacy for Two-Party Protocols. In DIMACS Workshop on Distributed Computing and Cryptography","volume":"2","author":"Beaver Donald","year":"1991","unstructured":"Donald Beaver . 1991 . Perfect Privacy for Two-Party Protocols. In DIMACS Workshop on Distributed Computing and Cryptography , Vol. 2 . Donald Beaver. 1991. Perfect Privacy for Two-Party Protocols. In DIMACS Workshop on Distributed Computing and Cryptography, Vol. 2."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445922"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Machine Learning (ICML).","author":"Biggio Battista","year":"2012","unstructured":"Battista Biggio , Blaine Nelson , and Pavel Laskov . 2012 . Poisoning Attacks against Support Vector Machines . In International Conference on Machine Learning (ICML). Battista Biggio, Blaine Nelson, and Pavel Laskov. 2012. Poisoning Attacks against Support Vector Machines. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_8_1","volume-title":"Machine Learning","volume":"28","author":"Caruana Rich","year":"1997","unstructured":"Rich Caruana . 1997 . Multitask Learning . Machine Learning , Vol. 28 , 1 (1997). Rich Caruana. 1997. Multitask Learning. Machine Learning, Vol. 28, 1 (1997)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1137\/0404004"},{"key":"e_1_3_2_1_10_1","volume-title":"An Overview of Privacy in Machine Learning. arXiv:2005.08679","author":"Cristofaro Emiliano De","year":"2020","unstructured":"Emiliano De Cristofaro . 2020. An Overview of Privacy in Machine Learning. arXiv:2005.08679 ( 2020 ). Emiliano De Cristofaro. 2020. An Overview of Privacy in Machine Learning. arXiv:2005.08679 (2020)."},{"key":"e_1_3_2_1_11_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork , Aaron Roth , 2014 . The Algorithmic Foundations of Differential Privacy . Foundations and Trends in Theoretical Computer Science , Vol. 9 , 3 -- 4 (2014). Cynthia Dwork, Aaron Roth, et al. 2014. The Algorithmic Foundations of Differential Privacy. Foundations and Trends in Theoretical Computer Science, Vol. 9, 3--4 (2014).","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature21056"},{"key":"e_1_3_2_1_13_1","unstructured":"European Union's Horizon 2020 Research and Innovation Programme. 2021. Shaping the Ethical Dimensions of Smart Information Systems. https:\/\/www.project-sherpa.eu\/. (2021). Accessed: 2021-07-01. European Union's Horizon 2020 Research and Innovation Programme. 2021. Shaping the Ethical Dimensions of Smart Information Systems. https:\/\/www.project-sherpa.eu\/. (2021). Accessed: 2021-07-01."},{"key":"e_1_3_2_1_14_1","volume-title":"Model-Agnostic Meta-Learning for Fast Adaptation of Deep Networks. In International Conference on Machine Learning (ICML).","author":"Finn Chelsea","year":"2017","unstructured":"Chelsea Finn , Pieter Abbeel , and Sergey Levine . 2017 . Model-Agnostic Meta-Learning for Fast Adaptation of Deep Networks. In International Conference on Machine Learning (ICML). Chelsea Finn, Pieter Abbeel, and Sergey Levine. 2017. Model-Agnostic Meta-Learning for Fast Adaptation of Deep Networks. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_16_1","volume-title":"Attribute-Based. In Springer Annual Cryptology Conference.","author":"Gentry Craig","year":"2013","unstructured":"Craig Gentry , Amit Sahai , and Brent Waters . 2013 . Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster , Attribute-Based. In Springer Annual Cryptology Conference. Craig Gentry, Amit Sahai, and Brent Waters. 2013. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. In Springer Annual Cryptology Conference."},{"volume-title":"Foundations of Cryptography","author":"Goldreich Oded","key":"e_1_3_2_1_17_1","unstructured":"Oded Goldreich . 2009. Foundations of Cryptography : Volume 2 , Basic Applications. Cambridge University Press . Oded Goldreich. 2009. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press."},{"key":"e_1_3_2_1_18_1","unstructured":"Yves Grandvalet and Yoshua Bengio. 2005. Semi-supervised Learning by Entropy Minimization. In Advances in Neural Information Processing Systems (NIPS). Yves Grandvalet and Yoshua Bengio. 2005. Semi-supervised Learning by Entropy Minimization. In Advances in Neural Information Processing Systems (NIPS)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2016.17216"},{"key":"e_1_3_2_1_20_1","volume-title":"Cross Modal Distillation for Supervision Transfer. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Gupta Saurabh","year":"2016","unstructured":"Saurabh Gupta , Judy Hoffman , and Jitendra Malik . 2016 . Cross Modal Distillation for Supervision Transfer. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Saurabh Gupta, Judy Hoffman, and Jitendra Malik. 2016. Cross Modal Distillation for Supervision Transfer. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_21_1","volume-title":"Trained Quantization and Huffman Coding. In International Conference on Learning Representations (ICLR).","author":"Han Song","year":"2016","unstructured":"Song Han , Huizi Mao , and William J Dally . 2016 . Deep Compression: Compressing Deep Neural Networks with Pruning , Trained Quantization and Huffman Coding. In International Conference on Learning Representations (ICLR). Song Han, Huizi Mao, and William J Dally. 2016. Deep Compression: Compressing Deep Neural Networks with Pruning, Trained Quantization and Huffman Coding. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_22_1","volume-title":"NIPS Workshop on Deep Learning and Representation Learning.","author":"Hinton Geoffrey","year":"2015","unstructured":"Geoffrey Hinton , Oriol Vinyals , and Jeffrey Dean . 2015 . Distilling the Knowledge in a Neural Network . In NIPS Workshop on Deep Learning and Representation Learning. Geoffrey Hinton, Oriol Vinyals, and Jeffrey Dean. 2015. Distilling the Knowledge in a Neural Network. In NIPS Workshop on Deep Learning and Representation Learning."},{"key":"e_1_3_2_1_23_1","volume-title":"Who Should Stop Unethical A.I.? The Newyorker Annals of Technology","author":"Hutson Matthew","year":"2021","unstructured":"Matthew Hutson . 2021. Who Should Stop Unethical A.I.? The Newyorker Annals of Technology ( 2021 ). Matthew Hutson. 2021. Who Should Stop Unethical A.I.? The Newyorker Annals of Technology (2021)."},{"key":"e_1_3_2_1_24_1","volume-title":"Label Propagation for Deep Semi-supervised Learning. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Iscen Ahmet","year":"2019","unstructured":"Ahmet Iscen , Giorgos Tolias , Yannis Avrithis , and Ondrej Chum . 2019 . Label Propagation for Deep Semi-supervised Learning. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, and Ondrej Chum. 2019. Label Propagation for Deep Semi-supervised Learning. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_25_1","volume-title":"High Accuracy and High Fidelity Extraction of Neural Networks. In USENIX Security Symposium.","author":"Jagielski Matthew","year":"2020","unstructured":"Matthew Jagielski , Nicholas Carlini , David Berthelot , Alex Kurakin , and Nicolas Papernot . 2020 . High Accuracy and High Fidelity Extraction of Neural Networks. In USENIX Security Symposium. Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, and Nicolas Papernot. 2020. High Accuracy and High Fidelity Extraction of Neural Networks. In USENIX Security Symposium."},{"key":"e_1_3_2_1_26_1","volume-title":"Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. In IEEE Symposium on Security and Privacy (S&P).","author":"Jagielski Matthew","year":"2018","unstructured":"Matthew Jagielski , Alina Oprea , Battista Biggio , Chang Liu , Cristina Nita-Rotaru , and Bo Li . 2018 . Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. In IEEE Symposium on Security and Privacy (S&P). Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, and Bo Li. 2018. Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. In IEEE Symposium on Security and Privacy (S&P)."},{"volume-title":"The Ethical Algorithm: The Science of Socially Aware Algorithm Design","author":"Kearns Michael","key":"e_1_3_2_1_27_1","unstructured":"Michael Kearns and Aaron Roth . 2019. The Ethical Algorithm: The Science of Socially Aware Algorithm Design . Oxford University Press . Michael Kearns and Aaron Roth. 2019. The Ethical Algorithm: The Science of Socially Aware Algorithm Design. Oxford University Press."},{"key":"e_1_3_2_1_28_1","volume-title":"Ethical Algorithm Design Should Guide Technology Regulation. Brookings Institution's Artificial Intelligence and Emerging Technology Initiative","author":"Kearns Michael","year":"2020","unstructured":"Michael Kearns and Aaron Roth . 2020. Ethical Algorithm Design Should Guide Technology Regulation. Brookings Institution's Artificial Intelligence and Emerging Technology Initiative ( 2020 ). Michael Kearns and Aaron Roth. 2020. Ethical Algorithm Design Should Guide Technology Regulation. Brookings Institution's Artificial Intelligence and Emerging Technology Initiative (2020)."},{"key":"e_1_3_2_1_29_1","volume-title":"Adam: A Method for Stochastic Optimization. In International Conference on Learning Representations (ICLR).","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A Method for Stochastic Optimization. In International Conference on Learning Representations (ICLR). Diederik P Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_30_1","volume-title":"Reducibility and Completeness in Multi-Party Private Computations. In IEEE Annual Symposium on Foundations of Computer Science (FOCS).","author":"Kushilevitz Eyal","year":"1994","unstructured":"Eyal Kushilevitz , Silvio Micali , and Rafail Ostrovsky . 1994 . Reducibility and Completeness in Multi-Party Private Computations. In IEEE Annual Symposium on Foundations of Computer Science (FOCS). Eyal Kushilevitz, Silvio Micali, and Rafail Ostrovsky. 1994. Reducibility and Completeness in Multi-Party Private Computations. In IEEE Annual Symposium on Foundations of Computer Science (FOCS)."},{"key":"e_1_3_2_1_31_1","volume-title":"Deep Learning","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun , Yoshua Bengio , and Geoffrey Hinton . 2015. Deep Learning . Springer Nature , Vol . 521, 7553 ( 2015 ). Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep Learning. Springer Nature, Vol. 521, 7553 (2015)."},{"key":"e_1_3_2_1_32_1","unstructured":"Tyler Lee and Anthony Ndirango. 2019. Generalization in Multitask Deep Neural Classifiers: A Statistical Physics Approach. In Advances in Neural Information Processing Systems (NeurIPS). Tyler Lee and Anthony Ndirango. 2019. Generalization in Multitask Deep Neural Classifiers: A Statistical Physics Approach. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_33_1","unstructured":"Lemonade Insurance Company. 2021. Lemonade's Claim Automation. https:\/\/www.lemonade.com\/blog\/lemonades-claim-automation. (2021). Accessed: 2021-07-01. Lemonade Insurance Company. 2021. Lemonade's Claim Automation. https:\/\/www.lemonade.com\/blog\/lemonades-claim-automation. (2021). Accessed: 2021-07-01."},{"key":"e_1_3_2_1_34_1","volume-title":"Mario Fritz, and Yang Zhang.","author":"Liu Yugeng","year":"2021","unstructured":"Yugeng Liu , Rui Wen , Xinlei He , Ahmed Salem , Zhikun Zhang , Michael Backes , Emiliano De Cristofaro , Mario Fritz, and Yang Zhang. 2021 . ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models . arXiv:2102.02551 (2021). Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, and Yang Zhang. 2021. ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. arXiv:2102.02551 (2021)."},{"key":"e_1_3_2_1_35_1","volume-title":"Deep Learning Face Attributes in the Wild. In International Conference on Computer Vision (ICCV).","author":"Liu Ziwei","year":"2015","unstructured":"Ziwei Liu , Ping Luo , Xiaogang Wang , and Xiaoou Tang . 2015 . Deep Learning Face Attributes in the Wild. In International Conference on Computer Vision (ICCV). Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. 2015. Deep Learning Face Attributes in the Wild. In International Conference on Computer Vision (ICCV)."},{"key":"e_1_3_2_1_36_1","unstructured":"Scott M Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In Advances in Neural Information Processing Systems (NIPS). Scott M Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In Advances in Neural Information Processing Systems (NIPS)."},{"key":"e_1_3_2_1_37_1","volume-title":"Feature Inference Attack on Model Predictions in Vertical Federated Learning. In IEEE International Conference on Data Engineering (ICDE).","author":"Luo Xinjian","year":"2021","unstructured":"Xinjian Luo , Yuncheng Wu , Xiaokui Xiao , and Beng Chin Ooi . 2021 . Feature Inference Attack on Model Predictions in Vertical Federated Learning. In IEEE International Conference on Data Engineering (ICDE). Xinjian Luo, Yuncheng Wu, Xiaokui Xiao, and Beng Chin Ooi. 2021. Feature Inference Attack on Model Predictions in Vertical Federated Learning. In IEEE International Conference on Data Engineering (ICDE)."},{"volume-title":"Information Theory, Inference and Learning Algorithms","author":"MacKay David J.C.","key":"e_1_3_2_1_38_1","unstructured":"David J.C. MacKay . 2003. Information Theory, Inference and Learning Algorithms . Cambridge University Press . David J.C. MacKay. 2003. Information Theory, Inference and Learning Algorithms. Cambridge University Press."},{"key":"e_1_3_2_1_39_1","volume-title":"Dopamine: Differentially Private Federated Learning on Medical Data. 2nd AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-21)","author":"Malekzadeh Mohammad","year":"2021","unstructured":"Mohammad Malekzadeh , Burak Hasircioglu , Nitish Mital , Kunal Katarya , Mehmet Emre Ozfatura , and Deniz G\u00fcnd\u00fcz . 2021 . Dopamine: Differentially Private Federated Learning on Medical Data. 2nd AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-21) (2021). Mohammad Malekzadeh, Burak Hasircioglu, Nitish Mital, Kunal Katarya, Mehmet Emre Ozfatura, and Deniz G\u00fcnd\u00fcz. 2021. Dopamine: Differentially Private Federated Learning on Medical Data. 2nd AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-21) (2021)."},{"key":"e_1_3_2_1_40_1","volume-title":"Sorelle A Friedler, Carlos Scheidegger, and Suresh Venkatasubramanian.","author":"Marx Charles T","year":"2019","unstructured":"Charles T Marx , Richard Lanas Phillips , Sorelle A Friedler, Carlos Scheidegger, and Suresh Venkatasubramanian. 2019 . Disentangling Influence : Using Disentangled Representations to Audit Model Predictions. In Advances in Neural Information Processing Systems (NeurIPS) . Charles T Marx, Richard Lanas Phillips, Sorelle A Friedler, Carlos Scheidegger, and Suresh Venkatasubramanian. 2019. Disentangling Influence: Using Disentangled Representations to Audit Model Predictions. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_41_1","volume-title":"Formal Limitations on the Measurement of Mutual Information. In Conference on Artificial Intelligence and Statistics (AISTATS).","author":"McAllester David","year":"2020","unstructured":"David McAllester and Karl Stratos . 2020 . Formal Limitations on the Measurement of Mutual Information. In Conference on Artificial Intelligence and Statistics (AISTATS). David McAllester and Karl Stratos. 2020. Formal Limitations on the Measurement of Mutual Information. In Conference on Artificial Intelligence and Statistics (AISTATS)."},{"key":"e_1_3_2_1_42_1","volume-title":"Conference on Artificial Intelligence and Statistics (AISTAT).","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan , Eider Moore , Daniel Ramage , Seth Hampson , and Blaise Aguera y Arcas . 2017 . Communication-Efficient Learning of Deep Networks from Decentralized Data . In Conference on Artificial Intelligence and Statistics (AISTAT). Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Conference on Artificial Intelligence and Statistics (AISTAT)."},{"key":"e_1_3_2_1_43_1","volume-title":"Exploiting Unintended Feature Leakage in Collaborative Learning. In IEEE Symposium on Security and Privacy (S&P).","author":"Melis Luca","year":"2019","unstructured":"Luca Melis , Congzheng Song , Emiliano De Cristofaro , and Vitaly Shmatikov . 2019 . Exploiting Unintended Feature Leakage in Collaborative Learning. In IEEE Symposium on Security and Privacy (S&P). Luca Melis, Congzheng Song, Emiliano De Cristofaro, and Vitaly Shmatikov. 2019. Exploiting Unintended Feature Leakage in Collaborative Learning. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_44_1","volume-title":"Privacy in Deep Learning: A survey. arXiv:2004.12254","author":"Mirshghallah Fatemehsadat","year":"2020","unstructured":"Fatemehsadat Mirshghallah , Mohammadkazem Taram , Praneeth Vepakomma , Abhishek Singh , Ramesh Raskar , and Hadi Esmaeilzadeh . 2020. Privacy in Deep Learning: A survey. arXiv:2004.12254 ( 2020 ). Fatemehsadat Mirshghallah, Mohammadkazem Taram, Praneeth Vepakomma, Abhishek Singh, Ramesh Raskar, and Hadi Esmaeilzadeh. 2020. Privacy in Deep Learning: A survey. arXiv:2004.12254 (2020)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388946"},{"key":"e_1_3_2_1_46_1","volume-title":"Greg Ver Steeg, and Aram Galstyan","author":"Moyer Daniel","year":"2018","unstructured":"Daniel Moyer , Shuyang Gao , Rob Brekelmans , Greg Ver Steeg, and Aram Galstyan . 2018 . Invariant Representations without Adversarial Training. In Advances in Neural Information Processing Systems (NeurIPS) . Daniel Moyer, Shuyang Gao, Rob Brekelmans, Greg Ver Steeg, and Aram Galstyan. 2018. Invariant Representations without Adversarial Training. In Advances in Neural Information Processing Systems (NeurIPS)."},{"volume-title":"Probabilistic Machine Learning: An Introduction","author":"Murphy Kevin P","key":"e_1_3_2_1_47_1","unstructured":"Kevin P Murphy . 2021. Probabilistic Machine Learning: An Introduction . MIT Press . Kevin P Murphy. 2021. Probabilistic Machine Learning: An Introduction. MIT Press."},{"key":"e_1_3_2_1_48_1","volume-title":"Machine Learning with Membership Privacy Using Adversarial Regularization. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Nasr Milad","year":"2018","unstructured":"Milad Nasr , Reza Shokri , and Amir Houmansadr . 2018 . Machine Learning with Membership Privacy Using Adversarial Regularization. In ACM SIGSAC Conference on Computer and Communications Security (CCS). Milad Nasr, Reza Shokri, and Amir Houmansadr. 2018. Machine Learning with Membership Privacy Using Adversarial Regularization. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_49_1","volume-title":"Science","volume":"366","author":"Obermeyer Ziad","year":"2019","unstructured":"Ziad Obermeyer , Brian Powers , Christine Vogeli , and Sendhil Mullainathan . 2019 . Dissecting Racial Bias in an Algorithm Used to Manage the Health of Populations . Science , Vol. 366 , 6464 (2019). Ziad Obermeyer, Brian Powers, Christine Vogeli, and Sendhil Mullainathan. 2019. Dissecting Racial Bias in an Algorithm Used to Manage the Health of Populations. Science, Vol. 366, 6464 (2019)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00772"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2967734"},{"key":"e_1_3_2_1_52_1","volume-title":"International Conference on Learning Representations (ICLR).","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Martin Abadi , Ulfar Erlingsson , Ian Goodfellow , and Kunal Talwar . 2016 . Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data . In International Conference on Learning Representations (ICLR). Nicolas Papernot, Martin Abadi, Ulfar Erlingsson, Ian Goodfellow, and Kunal Talwar. 2016. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. In International Conference on Learning Representations (ICLR)."},{"volume-title":"PyTorch: An Imperative Style","author":"Paszke Adam","key":"e_1_3_2_1_53_1","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , Luca Antiga , Alban Desmaison , Andreas Kopf , Edward Yang , Zachary DeVito , Martin Raison , Alykhan Tejani , Sasank Chilamkurthy , Benoit Steiner , Lu Fang , Junjie Bai , and Soumith Chintala . 2019. PyTorch: An Imperative Style , High-Performance Deep Learning Library . In Advances in Neural Information Processing Systems (NeurIPS). Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_55_1","volume-title":"On Variational Bounds of Mutual Information. In International Conference on Machine Learning (ICML).","author":"Poole Ben","year":"2019","unstructured":"Ben Poole , Sherjil Ozair , Aaron Van Den Oord , Alex Alemi , and George Tucker . 2019 . On Variational Bounds of Mutual Information. In International Conference on Machine Learning (ICML). Ben Poole, Sherjil Ozair, Aaron Van Den Oord, Alex Alemi, and George Tucker. 2019. On Variational Bounds of Mutual Information. In International Conference on Machine Learning (ICML)."},{"volume-title":"2021-05-01","key":"e_1_3_2_1_56_1","unstructured":"PyTorch. Accessed : 2021-05-01 . Pruning Library . https:\/\/github.com\/pytorch\/pytorch\/blob\/master\/torch\/nn\/utils\/prune.py. ( Accessed: 2021-05-01). PyTorch. Accessed: 2021-05-01. Pruning Library. https:\/\/github.com\/pytorch\/pytorch\/blob\/master\/torch\/nn\/utils\/prune.py. ( Accessed: 2021-05-01)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2005013117"},{"key":"e_1_3_2_1_58_1","volume-title":"Training Deep Neural Networks on Noisy Labels with Bootstrapping. In International Conference on Learning Representations (ICLR).","author":"Reed Scott E.","year":"2015","unstructured":"Scott E. Reed , Honglak Lee , Dragomir Anguelov , Christian Szegedy , Dumitru Erhan , and Andrew Rabinovich . 2015 . Training Deep Neural Networks on Noisy Labels with Bootstrapping. In International Conference on Learning Representations (ICLR). Scott E. Reed, Honglak Lee, Dragomir Anguelov, Christian Szegedy, Dumitru Erhan, and Andrew Rabinovich. 2015. Training Deep Neural Networks on Noisy Labels with Bootstrapping. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_59_1","volume-title":"Ml-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In Network and Distributed Systems Security Symposium (NDSS).","author":"Salem Ahmed","year":"2018","unstructured":"Ahmed Salem , Yang Zhang , Mathias Humbert , Pascal Berrang , Mario Fritz , and Michael Backes . 2018 . Ml-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In Network and Distributed Systems Security Symposium (NDSS). Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2018. Ml-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/ab3985"},{"key":"e_1_3_2_1_61_1","volume-title":"Deep Learning in Neural Networks: An Overview","author":"Schmidhuber J\u00fcrgen","year":"2015","unstructured":"J\u00fcrgen Schmidhuber . 2015. Deep Learning in Neural Networks: An Overview . Elsevier Neural Networks , Vol . 61 ( 2015 ). J\u00fcrgen Schmidhuber. 2015. Deep Learning in Neural Networks: An Overview. Elsevier Neural Networks, Vol. 61 (2015)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375815"},{"key":"e_1_3_2_1_63_1","volume-title":"Membership Inference Attacks Against Machine Learning Models. In IEEE Symposium on Security and Privacy (S&P).","author":"Shokri Reza","year":"2017","unstructured":"Reza Shokri , Marco Stronati , Congzheng Song , and Vitaly Shmatikov . 2017 . Membership Inference Attacks Against Machine Learning Models. In IEEE Symposium on Security and Privacy (S&P). Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_64_1","volume-title":"Opening the Black Box of Deep Neural Networks via Information. arXiv:1703.00810","author":"Shwartz-Ziv Ravid","year":"2017","unstructured":"Ravid Shwartz-Ziv and Naftali Tishby . 2017. Opening the Black Box of Deep Neural Networks via Information. arXiv:1703.00810 ( 2017 ). Ravid Shwartz-Ziv and Naftali Tishby. 2017. Opening the Black Box of Deep Neural Networks via Information. arXiv:1703.00810 (2017)."},{"key":"e_1_3_2_1_65_1","volume-title":"Machine Learning Models That Remember Too Much. ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Song Congzheng","year":"2017","unstructured":"Congzheng Song , Thomas Ristenpart , and Vitaly Shmatikov . 2017 . Machine Learning Models That Remember Too Much. ACM SIGSAC Conference on Computer and Communications Security (CCS). Congzheng Song, Thomas Ristenpart, and Vitaly Shmatikov. 2017. Machine Learning Models That Remember Too Much. ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_66_1","volume-title":"Overlearning Reveals Sensitive Attributes. In International Conference on Learning Representations (ICLR).","author":"Song Congzheng","year":"2020","unstructured":"Congzheng Song and Vitaly Shmatikov . 2020 . Overlearning Reveals Sensitive Attributes. In International Conference on Learning Representations (ICLR). Congzheng Song and Vitaly Shmatikov. 2020. Overlearning Reveals Sensitive Attributes. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_67_1","volume-title":"Intriguing Properties of Neural Networks. In International Conference on Learning Representations (ICLR).","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2014 . Intriguing Properties of Neural Networks. In International Conference on Learning Representations (ICLR). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing Properties of Neural Networks. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_68_1","unstructured":"Antti Tarvainen and Harri Valpola. 2017. Mean Teachers are Better Role Models: Weight-averaged Consistency Targets Improve Semi-supervised Deep Learning Results. In Advances in Neural Information Processing Systems (NIPS). Antti Tarvainen and Harri Valpola. 2017. Mean Teachers are Better Role Models: Weight-averaged Consistency Targets Improve Semi-supervised Deep Learning Results. In Advances in Neural Information Processing Systems (NIPS)."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.226"},{"key":"e_1_3_2_1_70_1","unstructured":"Tijmen Schep. 2021. How Normal Am I? https:\/\/www.hownormalami.eu. (2021). Accessed: 2021-07-01. Tijmen Schep. 2021. How Normal Am I? https:\/\/www.hownormalami.eu. (2021). Accessed: 2021-07-01."},{"key":"e_1_3_2_1_71_1","volume-title":"The Information Bottleneck Method. In Annual Allerton Conference on Communication, Control and Computing.","author":"Tishby Naftali","year":"2000","unstructured":"Naftali Tishby , Fernando C. Pereira , and William Bialek . 2000 . The Information Bottleneck Method. In Annual Allerton Conference on Communication, Control and Computing. Naftali Tishby, Fernando C. Pereira, and William Bialek. 2000. The Information Bottleneck Method. In Annual Allerton Conference on Communication, Control and Computing."},{"key":"e_1_3_2_1_72_1","volume-title":"Deep Learning and the Information Bottleneck Principle. In IEEE Information Theory Workshop (ITW).","author":"Tishby Naftali","year":"2015","unstructured":"Naftali Tishby and Noga Zaslavsky . 2015 . Deep Learning and the Information Bottleneck Principle. In IEEE Information Theory Workshop (ITW). Naftali Tishby and Noga Zaslavsky. 2015. Deep Learning and the Information Bottleneck Principle. In IEEE Information Theory Workshop (ITW)."},{"key":"e_1_3_2_1_73_1","volume-title":"Stealing Machine Learning Models Via Prediction APIs. In USENIX Security Symposium.","author":"Tram\u00e8r Florian","year":"2016","unstructured":"Florian Tram\u00e8r , Fan Zhang , Ari Juels , Michael K Reiter , and Thomas Ristenpart . 2016 . Stealing Machine Learning Models Via Prediction APIs. In USENIX Security Symposium. Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models Via Prediction APIs. In USENIX Security Symposium."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"e_1_3_2_1_75_1","volume-title":"The Role of The Information Bottleneck in Representation Learning. In IEEE International Symposium on Information Theory (ISIT).","author":"Vera Matias","year":"2018","unstructured":"Matias Vera , Pablo Piantanida , and Leonardo Rey Vega . 2018 . The Role of The Information Bottleneck in Representation Learning. In IEEE International Symposium on Information Theory (ISIT). Matias Vera, Pablo Piantanida, and Leonardo Rey Vega. 2018. The Role of The Information Bottleneck in Representation Learning. In IEEE International Symposium on Information Theory (ISIT)."},{"key":"e_1_3_2_1_76_1","volume-title":"Expression of Concern: Facial Feature Discovery for Ethnicity Recognition","author":"Wang Cunrui","year":"2019","unstructured":"Cunrui Wang , Qingling Zhang , Wanquan Liu , Yu Liu , and Lixin Miao . 2019. Expression of Concern: Facial Feature Discovery for Ethnicity Recognition . Wiley Interdisciplinary Reviews : Data Mining and Knowledge Discovery, Vol. 9 , 1 ( 2019 ). Cunrui Wang, Qingling Zhang, Wanquan Liu, Yu Liu, and Lixin Miao. 2019. Expression of Concern: Facial Feature Discovery for Ethnicity Recognition. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, Vol. 9, 1 (2019)."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011190"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220106"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1037\/pspa0000098"},{"key":"e_1_3_2_1_80_1","unstructured":"Yandong Wen Bhiksha Raj and Rita Singh. 2019. Face Reconstruction from Voice using Generative Adversarial Networks. In Advances in Neural Information Processing Systems (NeurIPS). Yandong Wen Bhiksha Raj and Rita Singh. 2019. Face Reconstruction from Voice using Generative Adversarial Networks. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_81_1","article-title":"Privacy and Freedom","volume":"25","author":"Westin Alan F","year":"1968","unstructured":"Alan F Westin . 1968 . Privacy and Freedom . Washington and Lee Law Review , Vol. 25 , 1 (1968). Alan F Westin. 1968. Privacy and Freedom. Washington and Lee Law Review, Vol. 25, 1 (1968).","journal-title":"Washington and Lee Law Review"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.42"},{"key":"e_1_3_2_1_84_1","volume-title":"Self-training with Noisy Student Improves ImageNet Classification. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Xie Qizhe","year":"2020","unstructured":"Qizhe Xie , Minh-Thang Luong , Eduard Hovy , and Quoc V Le . 2020 . Self-training with Noisy Student Improves ImageNet Classification. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Qizhe Xie, Minh-Thang Luong, Eduard Hovy, and Quoc V Le. 2020. Self-training with Noisy Student Improves ImageNet Classification. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_85_1","volume-title":"Generalization Bounds of Multitask Learning From Perspective of Vector-Valued Function Learning","author":"Zhang Chao","year":"2020","unstructured":"Chao Zhang , Dacheng Tao , Tao Hu , and Bingchen Liu . 2020. Generalization Bounds of Multitask Learning From Perspective of Vector-Valued Function Learning . IEEE Transactions on Neural Networks and Learning Systems ( 2020 ). Chao Zhang, Dacheng Tao, Tao Hu, and Bingchen Liu. 2020. Generalization Bounds of Multitask Learning From Perspective of Vector-Valued Function Learning. IEEE Transactions on Neural Networks and Learning Systems (2020)."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.463"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T01:12:21Z","timestamp":1673140341000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484533"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":84,"alternative-id":["10.1145\/3460120.3484533","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484533","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}