{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2016:RQV2T27HP7OJXTZXSI5P56G5WD","short_pith_number":"pith:RQV2T27H","schema_version":"1.0","canonical_sha256":"8c2ba9ebe77fdc9bcf37923afef8ddb0e3a701b27151bb1e6729642733ee7c31","source":{"kind":"arxiv","id":"1610.05820","version":2},"attestation_state":"computed","paper":{"title":"Membership Inference Attacks against Machine Learning Models","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG","stat.ML"],"primary_cat":"cs.CR","authors_text":"Congzheng Song, Marco Stronati, Reza Shokri, Vitaly Shmatikov","submitted_at":"2016-10-18T22:38:33Z","abstract_excerpt":"We quantitatively investigate how machine learning models leak information about the individual data records on which they were trained. We focus on the basic membership inference attack: given a data record and black-box access to a model, determine if the record was in the model's training dataset. To perform membership inference against a target model, we make adversarial use of machine learning and train our own inference model to recognize differences in the target model's predictions on the inputs that it trained on versus the inputs that it did not train on.\n  We empirically evaluate ou"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1610.05820","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2016-10-18T22:38:33Z","cross_cats_sorted":["cs.LG","stat.ML"],"title_canon_sha256":"12d5481a4c52b94a589387e10f2ed67de3bd411b8a28454bf822714230da6464","abstract_canon_sha256":"26d7e6cffac5aca44c9ca9c7c5a5890a91d5f1ddc22c244fae11954fdc8ae78c"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:47:26.729963Z","signature_b64":"Yv9lBq36awe56MAKuJPOwADH3Q9eurBmBTplP5LOH59goy/IqNbMvvyE5bifbIuxCB5UKmwPb+zVpGbrYzWbCA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"8c2ba9ebe77fdc9bcf37923afef8ddb0e3a701b27151bb1e6729642733ee7c31","last_reissued_at":"2026-05-18T00:47:26.729292Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:47:26.729292Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Membership Inference Attacks against Machine Learning Models","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG","stat.ML"],"primary_cat":"cs.CR","authors_text":"Congzheng Song, Marco Stronati, Reza Shokri, Vitaly Shmatikov","submitted_at":"2016-10-18T22:38:33Z","abstract_excerpt":"We quantitatively investigate how machine learning models leak information about the individual data records on which they were trained. We focus on the basic membership inference attack: given a data record and black-box access to a model, determine if the record was in the model's training dataset. To perform membership inference against a target model, we make adversarial use of machine learning and train our own inference model to recognize differences in the target model's predictions on the inputs that it trained on versus the inputs that it did not train on.\n  We empirically evaluate ou"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1610.05820","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1610.05820","created_at":"2026-05-18T00:47:26.729420+00:00"},{"alias_kind":"arxiv_version","alias_value":"1610.05820v2","created_at":"2026-05-18T00:47:26.729420+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1610.05820","created_at":"2026-05-18T00:47:26.729420+00:00"},{"alias_kind":"pith_short_12","alias_value":"RQV2T27HP7OJ","created_at":"2026-05-18T12:30:41.710351+00:00"},{"alias_kind":"pith_short_16","alias_value":"RQV2T27HP7OJXTZX","created_at":"2026-05-18T12:30:41.710351+00:00"},{"alias_kind":"pith_short_8","alias_value":"RQV2T27H","created_at":"2026-05-18T12:30:41.710351+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":3,"internal_anchor_count":2,"sample":[{"citing_arxiv_id":"2605.16462","citing_title":"Asking Back: Interaction-Layer Antidistillation Watermarks","ref_index":32,"is_internal_anchor":true},{"citing_arxiv_id":"2605.12792","citing_title":"SoK: A Comprehensive Analysis of the Current Status of Neural Tangent Generalization Attacks with Research Directions","ref_index":82,"is_internal_anchor":true},{"citing_arxiv_id":"2604.27804","citing_title":"Machine Unlearning for Class Removal through SISA-based Deep Neural Network Architectures","ref_index":8,"is_internal_anchor":false}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/RQV2T27HP7OJXTZXSI5P56G5WD","json":"https://pith.science/pith/RQV2T27HP7OJXTZXSI5P56G5WD.json","graph_json":"https://pith.science/api/pith-number/RQV2T27HP7OJXTZXSI5P56G5WD/graph.json","events_json":"https://pith.science/api/pith-number/RQV2T27HP7OJXTZXSI5P56G5WD/events.json","paper":"https://pith.science/paper/RQV2T27H"},"agent_actions":{"view_html":"https://pith.science/pith/RQV2T27HP7OJXTZXSI5P56G5WD","download_json":"https://pith.science/pith/RQV2T27HP7OJXTZXSI5P56G5WD.json","view_paper":"https://pith.science/paper/RQV2T27H","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1610.05820&json=true","fetch_graph":"https://pith.science/api/pith-number/RQV2T27HP7OJXTZXSI5P56G5WD/graph.json","fetch_events":"https://pith.science/api/pith-number/RQV2T27HP7OJXTZXSI5P56G5WD/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/RQV2T27HP7OJXTZXSI5P56G5WD/action/timestamp_anchor","attest_storage":"https://pith.science/pith/RQV2T27HP7OJXTZXSI5P56G5WD/action/storage_attestation","attest_author":"https://pith.science/pith/RQV2T27HP7OJXTZXSI5P56G5WD/action/author_attestation","sign_citation":"https://pith.science/pith/RQV2T27HP7OJXTZXSI5P56G5WD/action/citation_signature","submit_replication":"https://pith.science/pith/RQV2T27HP7OJXTZXSI5P56G5WD/action/replication_record"}},"created_at":"2026-05-18T00:47:26.729420+00:00","updated_at":"2026-05-18T00:47:26.729420+00:00"}