{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T03:54:09Z","timestamp":1777434849085,"version":"3.51.4"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102098"],"award-info":[{"award-number":["62102098"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong Research Grants Council General Research Fund","award":["RGC\/HKBU12200518"],"award-info":[{"award-number":["RGC\/HKBU12200518"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3149397","type":"journal-article","created":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T20:50:57Z","timestamp":1644267057000},"page":"716-731","source":"Crossref","is-referenced-by-count":6,"title":["Revealing Task-Relevant Model Memorization for Source-Protected Unsupervised Domain Adaptation"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9092-3164","authenticated-orcid":false,"given":"Baoyao","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0165-8416","authenticated-orcid":false,"given":"Andy Jinhua","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9343-2202","authenticated-orcid":false,"given":"Pong C.","family":"Yuen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.2998275"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3001665"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/96"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"234","DOI":"10.69554\/TCFN5165","article-title":"Understanding the scope and impact of the California consumer privacy act of 2018","volume":"2","author":"Harding","year":"2019","journal-title":"J. Data Protection Privacy"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.316"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00072"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00966"},{"key":"ref10","first-page":"6028","article-title":"Do we really need to access the source data? Source hypothesis transfer for unsupervised domain adaptation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Liang"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00052"},{"key":"ref12","first-page":"17","article-title":"Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing","volume-title":"Proc. 23rd USENIX Secur. Symp.","author":"Fredrikson"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2018.0083"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"ref16","first-page":"267","article-title":"The secret sharer: Evaluating and testing unintended memorization in neural networks","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Carlini"},{"key":"ref17","article-title":"Membership model inversion attacks for deep networks","volume-title":"Proc. NIPS Workshop Privacy Mach. Learn.","author":"Basu"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354261"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359824"},{"key":"ref20","article-title":"Gamin: An adversarial approach to black-box model inversion","volume-title":"Proc. AAAI Workshop Privacy-Preserving Artif. Intell.","author":"A\u00efvodji"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939716"},{"key":"ref22","article-title":"Unsupervised domain adaptation with random walks on target labelings","author":"van Laarhoven","year":"2017","journal-title":"arXiv:1706.05335"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.2347059"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.18"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00189"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2868685"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49409-8_35"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00234"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00410"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107943"},{"key":"ref31","first-page":"1","article-title":"Self-ensembling for visual domain adaptation","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"French"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01388"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.04.027"},{"key":"ref34","first-page":"7523","article-title":"On learning invariant representations for domain adaptation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhao"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3082687"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2801312"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107888"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3011934"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00566"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00460"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01239"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3103390"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3110179"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00997"},{"key":"ref45","first-page":"1","article-title":"Model adaptation: Historical contrastive learning for unsupervised domain adaptation without source data","volume-title":"Proc. 35th Conf. Neural Inf. Process. Syst.","author":"Huang"},{"key":"ref46","first-page":"1","article-title":"Adversarial dropout regularization","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Saito"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00888"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17029"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/3DV50981.2020.00087"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00127"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87196-3_51"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/402"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3111034"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00874"},{"key":"ref55","first-page":"233","article-title":"A closer look at memorization in deep networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Arpit"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15561-1_16"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/34.291440"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.2118\/18761-MS"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.572"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"ref63","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","volume-title":"Proc. Int. Conf. Biometrics Special Interest Group (BIOSIG)","author":"Chingovska"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.77"},{"key":"ref66","first-page":"2208","article-title":"Deep transfer learning with joint adaptation networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Long"},{"key":"ref67","first-page":"6043","article-title":"LAMDA: Label matching deep domain adaptation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Le"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref69","first-page":"1","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Krizhevsky"},{"key":"ref70","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"},{"key":"ref71","first-page":"1","article-title":"When does label smoothing help?","volume-title":"Proc. Conf. Neural Inf. Process. Syst.","author":"M\u00fcller"},{"key":"ref72","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09705526.pdf?arnumber=9705526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T01:52:57Z","timestamp":1726624377000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9705526\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3149397","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}