{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T13:21:26Z","timestamp":1776000086771,"version":"3.50.1"},"reference-count":47,"publisher":"Wiley","issue":"11","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J of Intelligent Sys"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1002\/int.23021","type":"journal-article","created":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T11:20:39Z","timestamp":1662031239000},"page":"9921-9935","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["KD\u2010GAN: An effective membership inference attacks defence framework"],"prefix":"10.1155","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9562-5673","authenticated-orcid":false,"given":"Zhenxin","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong China"}]},{"given":"Guanbiao","family":"Lin","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong China"}]},{"given":"Lishan","family":"Ke","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong China"}]},{"given":"Shiyu","family":"Peng","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong China"}]},{"given":"Li","family":"Hu","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong China"}]},{"given":"Hongyang","family":"Yan","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong China"}]}],"member":"311","published-online":{"date-parts":[[2022,9]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"crossref","unstructured":"HeK ZhangX RenS SunJ.Delving deep into rectifiers: Surpassing human\u2010level performance on imagenet classification. Proceedings of the IEEE International Conference on Computer Vision;2015:1026\u20101034.","DOI":"10.1109\/ICCV.2015.123"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22372"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106782"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22365"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639344"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414055"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3086910"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2015.50"},{"key":"e_1_2_8_10_1","doi-asserted-by":"crossref","unstructured":"JiangN JieW LiJ LiuX JinD.GATrust: A multi\u2010aspect graph attention network model for trust assessment in OSNs.IEEE Trans Knowl Data Eng.2022.doi:10.1109\/TKDE.2022.3174044","DOI":"10.1109\/TKDE.2022.3174044"},{"key":"e_1_2_8_11_1","unstructured":"LiJ HuX XiongP ZhouW et al.The dynamic privacy\u2010preserving mechanisms for online dynamic social networks.IEEE Trans Knowl Data Eng.2020."},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_2_8_13_1","unstructured":"SalemA ZhangY HumbertM BerrangP FritzM BackesM.Ml\u2010leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246.2018."},{"key":"e_1_2_8_14_1","doi-asserted-by":"crossref","unstructured":"HuL LiJ LinG et al.Defending against membership inference attacks with high utility by GAN.IEEE Trans Depend Secure Comput.2022.doi:10.1109\/TDSC.2022.3174569","DOI":"10.1109\/TDSC.2022.3174569"},{"key":"e_1_2_8_15_1","doi-asserted-by":"crossref","unstructured":"JiaJ SalemA BackesM ZhangY GongNZ. Memguard: Defending against black\u2010box membership inference attacks via adversarial examples. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security;2019:259\u2010274.","DOI":"10.1145\/3319535.3363201"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.09.064"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62460-6_52"},{"key":"e_1_2_8_18_1","doi-asserted-by":"crossref","unstructured":"GanjuK WangQ YangW GunterCA BorisovN.Property inference attacks on fully connected neural networks using permutation invariant representations. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security;2018:619\u2010633.","DOI":"10.1145\/3243734.3243834"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22349"},{"key":"e_1_2_8_20_1","doi-asserted-by":"crossref","unstructured":"MoK TangW LiJ YuanX.Attacking deep reinforcement learning with decoupled adversarial policy.IEEE Trans Depend Secure Comput.2022.doi:10.1109\/TDSC.2022.3143566","DOI":"10.1109\/TDSC.2022.3143566"},{"key":"e_1_2_8_21_1","unstructured":"SalemA BhattacharyaA BackesM FritzM ZhangY.{Updates\u2010Leak}: data set inference and reconstruction attacks in online learning. In: 29th USENIX Security Symposium (USENIX Security20);2020:1291\u20101308."},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"e_1_2_8_23_1","first-page":"5558","volume-title":"International Conference on Machine Learning","author":"Sablayrolles A","year":"2019"},{"key":"e_1_2_8_24_1","unstructured":"SongL MittalP.Systematic evaluation of privacy risks of machine learning models. 30th USENIX Security Symposium (USENIX Security 21);2021:2615\u20102632."},{"key":"e_1_2_8_25_1","unstructured":"LiZ ZhangY.Label\u2010leaks: Membership inference attack with label. arXiv preprint arXiv:2007.15528.2020."},{"key":"e_1_2_8_26_1","doi-asserted-by":"crossref","unstructured":"AbadiM ChuA GoodfellowI et al. Deep learning with differential privacy. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security;2016:308\u2010318.","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_2_8_27_1","doi-asserted-by":"crossref","unstructured":"LiJ YeH LiT et al.Efficient and secure outsourcing of differentially private data publishing with multiple evaluators.IEEE Trans Depend Secure Comput.2020.doi:10.1109\/TDSC.2020.3015886","DOI":"10.1109\/TDSC.2020.3015886"},{"key":"e_1_2_8_28_1","doi-asserted-by":"crossref","unstructured":"NasrM ShokriR HoumansadrA.Machine learning with membership privacy using adversarial regularization. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security;2018:634\u2010646.","DOI":"10.1145\/3243734.3243855"},{"issue":"11","key":"e_1_2_8_29_1","first-page":"9549","article-title":"Membership privacy for machine learning models through knowledge transfer","volume":"35","author":"Shejwalkar V","year":"2021","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"e_1_2_8_30_1","doi-asserted-by":"crossref","unstructured":"BuciluaC CaruanaR Niculescu\u2010MizilA.Model compression. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining;2006:535\u2010541.","DOI":"10.1145\/1150402.1150464"},{"key":"e_1_2_8_31_1","unstructured":"HintonG VinyalsO DeanJ et al. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531.2015;2(7)."},{"key":"e_1_2_8_32_1","unstructured":"GoodfellowI Pouget\u2010AbadieJ MirzaM et al.Generative adversarial nets.Adv Neural Inf Process Syst.2014;27."},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.01.046"},{"issue":"6","key":"e_1_2_8_36_1","first-page":"2969","article-title":"NPMML: A framework for non\u2010interactive privacy\u2010preserving multi\u2010party machine learning","volume":"18","author":"Li T","year":"2020","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"e_1_2_8_37_1","unstructured":"HayesJ MelisL DanezisG De CristofaroE.LOGAN: evaluating privacy leakage of generative models using generative adversarial networks. arXiv preprint arXiv:1705.07663.2017:506\u2010519."},{"key":"e_1_2_8_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37352-8_11"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_2_8_40_1","doi-asserted-by":"crossref","unstructured":"GaoC LiJ XiaS ChooKKR LouW DongC.Mas\u2010encryption and its applications in privacy\u2010preserving classifiers.IEEE Trans Knowl Data Eng.2020.doi:10.1109\/TKDE.2020.3009221","DOI":"10.1109\/TKDE.2020.3009221"},{"key":"e_1_2_8_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2894411"},{"key":"e_1_2_8_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01242-z"},{"key":"e_1_2_8_43_1","unstructured":"MicaelliP StorkeyAJ.Zero\u2010shot knowledge transfer via adversarial belief matching.Adv Neural Inf Process Syst.2019;32."},{"key":"e_1_2_8_44_1","first-page":"12104","article-title":"Training generative adversarial networks with limited data","volume":"33","author":"Karras T","year":"2020","journal-title":"Adv Neural Inf Process Syst"},{"key":"e_1_2_8_45_1","unstructured":"XuL SkoularidouM Cuesta\u2010InfanteA VeeramachaneniK.Modeling tabular data using conditional gan.Adv Neural Inf Process Syst.2019;32."},{"key":"e_1_2_8_46_1","unstructured":"LiH.Exploring knowledge distillation of deep neural networks for efficient hardware solutions. University Of Stanford: CS230 course report;2018."},{"key":"e_1_2_8_47_1","unstructured":"KrizhevskyA HintonG et al. Learning multiple layers of features from tiny images.2009."},{"key":"e_1_2_8_48_1","unstructured":"LeinoK FredriksonM.Stolen memories: leveraging model memorization for calibrated {White\u2010Box} membership inference. 29th USENIX Security Symposium (USENIX Security 20);2020:1605\u20101622."}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.23021","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/int.23021","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.23021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T15:32:57Z","timestamp":1675956777000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/int.23021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":47,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["10.1002\/int.23021"],"URL":"https:\/\/doi.org\/10.1002\/int.23021","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9]]},"assertion":[{"value":"2022-07-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}