Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures

作者: Matt Fredrikson , Somesh Jha , Thomas Ristenpart

DOI: 10.1145/2810103.2813677

关键词:

摘要: … We develop a new class of model inversion attack that exploits confidence values revealed along with predictions. Our new attacks are applicable in a variety of settings, and we explore …

参考文章(25)
Latanya Sweeney, Simple Demographics Often Identify People Uniquely Carnegie Mellon University. ,(2000) , 10.1184/R1/6625769.V1
Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart, None, Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing usenix security symposium. ,vol. 2014, pp. 17- 32 ,(2014)
TE Klein, RB Altman, Niclas Eriksson, BF Gage, SE Kimmel, MT Lee, NA Limdi, D Page, DM Roden, MJ Wagner, MD Caldwell, JA Johnson, YT Chen, MS Wen, Y Caraco, I Achache, S Blotnick, M Muszkat, JG Shin, HS Kim, G Suarez-Kurtz, JA Perini, E Silva-Assuncao, JL Anderson, BD Horne, JF Carlquist, RL Berg, JK Burmester, BC Goh, SC Lee, F Kamali, E Sconce, AK Daly, AH Wu, TY Langaee, H Feng, L Cavallari, K Momary, M Pirmohamed, A Jorgensen, CH Toh, P Williamson, H McLeod, JP Evans, KE Weck, C Brensinger, Y Nakamura, T Mushiroda, D Veenstra, L Meckley, MJ Rieder, AE Rettie, M Wadelius, H Melhus, CM Stein, U Schwartz, D Kurnik, E Deych, P Lenzini, C Eby, LY Chen, P Deloukas, A Motsinger-Reif, H Sagreiya, BS Srinivasan, E Lantz, T Chang, M Ritchie, LS Lu, Estimation of the warfarin dose with clinical and pharmacogenetic data The New England Journal of Medicine. ,vol. 360, pp. 753- 764 ,(2009) , 10.1056/NEJMOA0809329
Denis Nekipelov, Evgeny Yakovlev, Tatiana Komarova, Estimation of Treatment Effects from Combined Data: Identification versus Data Security Research Papers in Economics. pp. 279- 308 ,(2015)
Ian J Goodfellow, David Warde-Farley, Pascal Lamblin, Vincent Dumoulin, Mehdi Mirza, Razvan Pascanu, James Bergstra, Frédéric Bastien, Yoshua Bengio, None, Pylearn2: a machine learning research library arXiv: Machine Learning. ,(2013)
G. B. Huang, Honglak Lee, E. Learned-Miller, Learning hierarchical representations for face verification with convolutional deep belief networks computer vision and pattern recognition. pp. 2518- 2525 ,(2012) , 10.1109/CVPR.2012.6247968
Ninghui Li, Wahbeh Qardaji, Dong Su, Yi Wu, Weining Yang, Membership privacy: a unifying framework for privacy definitions computer and communications security. pp. 889- 900 ,(2013) , 10.1145/2508859.2516686
Nils Homer, Szabolcs Szelinger, Margot Redman, David Duggan, Waibhav Tembe, Jill Muehling, John V Pearson, Dietrich A Stephan, Stanley F Nelson, David W Craig, None, Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLOS Genetics. ,vol. 4, ,(2008) , 10.1371/JOURNAL.PGEN.1000167
Shiva Prasad Kasiviswanathan, Mark Rudelson, Adam Smith, Jonathan Ullman, The price of privately releasing contingency tables and the spectra of random matrices with correlated rows Proceedings of the 42nd ACM symposium on Theory of computing - STOC '10. pp. 775- 784 ,(2010) , 10.1145/1806689.1806795
Graham Cormode, Personal privacy vs population privacy Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '11. pp. 1253- 1261 ,(2011) , 10.1145/2020408.2020598