Membership inference(MI)attacks threaten user privacy through determining if a given data example has been used to train a target *** MI defenses protect the membership privacy through preemptive exclusion of members ...
详细信息
Membership inference(MI)attacks threaten user privacy through determining if a given data example has been used to train a target *** MI defenses protect the membership privacy through preemptive exclusion of members techniques and knowledge ***,using either of these two defenses alone,the defense effect can still offers an unsatisfactory trade-off between membership privacy and *** that the defense method that directly combines these two defenses is still very limited(e.g.,the test accuracy of the target model is decreased by about 40%(in our experiments)),in this work,we propose a dual defense(DD)method that includes the preemptive exclusion of high-risk member samples module and the knowledge distillation module,which thwarts the access of the resulting models to the private training data twice to mitigate MI *** defense method can be divided into two steps:the preemptive exclusion of high-risk member samples(Step 1)and the knowledge distillation to obtain the protected student model(Step 2).We propose three types of exclusions:existing MI attacks-based exclusions,sample distances of members and nonmembers-based exclusions,and mutual information value-based exclusions,to preemptively exclude the high-risk member *** the knowledge distillation phase,we add ground-truth labeled data to the reference dataset to decrease the protected student model's dependency on soft labels,aiming to maintain or improve its test *** evaluation shows that DD significantly outperforms state-of-the-art defenses and offers a better privacy-utility *** example,DD achieves∼100%test accuracy improvement over the distillation for membership privacy(DMP)defense for ResNet50 trained on *** simultaneously achieves the reductions in the attack effectiveness(e.g.,the TPR@0.01%FPR of enhanced MI attacks decreased by 2.10%on the ImageNet dataset,the membership advantage(MA)of risk score-based attacks d
Membership inference(MI)attacks mainly aim to infer whether a data record was used to train a target model or *** to the serious privacy risks,MI attacks have been attracting a tremendous amount of attention in the re...
详细信息
Membership inference(MI)attacks mainly aim to infer whether a data record was used to train a target model or *** to the serious privacy risks,MI attacks have been attracting a tremendous amount of attention in the research *** existing work conducted-to our best knowledge the first dedicated survey study in this specific area:The survey provides a comprehensive review of the literature during the period of 2017~2021(e.g.,over 100 papers).However,due to the tremendous amount of progress(i.e.,176 papers)made in this area since 2021,the survey conducted by the one existing work has unfortunately already become very limited in the following two aspects:(1)Although the entire literature from 2017~2021 covers 18 ways to categorize(all the proposed)MI attacks,the literature during the period of 2017~2021,which was reviewed in the one existing work,only covered 5 ways to categorize MI *** 13 ways missing,the survey conducted by the one existing work only covers 27%of the landscape(in terms of how to categorize MI attacks)if a retrospective view is taken.(2)Since the literature during the period of 2017~2021 only covers 27%of the landscape(in terms of how to categorize),the number of new insights(i.e.,why an MI attack could succeed)behind all the proposed MI attacks has been significantly increasing since year *** a result,although none of the previous work has made the insights as a main focus of their studies,we found that the various insights leveraged in the literature can be broken down into 10 *** making the insights as a main focus,a survey study could fail to help researchers gain adequate intellectual depth in this area of *** this work,we conduct a systematic study to address these *** particular,in order to address the first limitation,we make the 13 newly emerged ways to categorize MI attacks as a main focus on the *** order to address the second limitation,we provide-to our best knowledge-the first r
暂无评论