LOGAN: Membership Inference Attacks Against Generative Models

作者: George Danezis , Emiliano De Cristofaro , Luca Melis , Jamie Hayes

DOI:

关键词: OverfittingGenerative modelInferenceComputer scienceRobustness (computer science)Machine learningGenerative grammarArtificial intelligenceLeverage (statistics)Discriminative model

摘要: … To mount the attacks, we train a Generative Adversarial Network (GAN) … to memorize the training data in such a way that an adversary can later extract training inputs with only black-box …

参考文章(55)
Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart, None, Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing usenix security symposium. ,vol. 2014, pp. 17- 32 ,(2014)
Yehuda Lindell, Benny Pinkas, Privacy Preserving Data Mining international cryptology conference. pp. 36- 54 ,(2000) , 10.1007/3-540-44598-6_3
Marwan Mattar, Tamara Berg, Gary B. Huang, Eric Learned-Miller, Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments Workshop on Faces in 'Real-Life' Images: Detection, Alignment, and Recognition. ,(2008)
Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem Beyah, On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge. network and distributed system security symposium. ,(2015) , 10.14722/NDSS.2015.23096
Nils Homer, Szabolcs Szelinger, Margot Redman, David Duggan, Waibhav Tembe, Jill Muehling, John V Pearson, Dietrich A Stephan, Stanley F Nelson, David W Craig, None, Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLOS Genetics. ,vol. 4, ,(2008) , 10.1371/JOURNAL.PGEN.1000167
Matt Fredrikson, Somesh Jha, Thomas Ristenpart, Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures computer and communications security. pp. 1322- 1333 ,(2015) , 10.1145/2810103.2813677
Reza Shokri, Vitaly Shmatikov, Privacy-Preserving Deep Learning computer and communications security. pp. 1310- 1321 ,(2015) , 10.1145/2810103.2813687
, Generative Adversarial Nets neural information processing systems. ,vol. 27, pp. 2672- 2680 ,(2014) , 10.3156/JSOFT.29.5_177_2
Cynthia Dwork, Differential privacy: a survey of results theory and applications of models of computation. ,vol. 4978, pp. 1- 19 ,(2008) , 10.1007/978-3-540-79228-4_1
Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov, "You Might Also Like:" Privacy Risks of Collaborative Filtering ieee symposium on security and privacy. pp. 231- 246 ,(2011) , 10.1109/SP.2011.40