Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers

作者: Giuseppe Ateniese , Luigi V. Mancini , Angelo Spognardi , Antonio Villani , Domenico Vitali

DOI: 10.1504/IJSN.2015.071829

关键词:

摘要: Machine-learning ML enables computers to learn how recognise patterns, make unintended decisions, or react a dynamic environment. The effectiveness of trained machines varies because more suitable algorithms superior training sets. Although are known and publicly released, sets may not be reasonably ascertainable and, indeed, guarded as trade secrets. In this paper we focus our attention on classifiers the statistical information that can unconsciously maliciously revealed from them. We show it is possible infer unexpected but useful classifiers. particular, build novel meta-classifier train hack other classifiers, obtaining meaningful about their Such leakage exploited, for example, by vendor effective simply acquire secrets competitor's apparatus, potentially violating its intellectual property rights.

参考文章(58)
Sanjam Garg, Craig Gentry, Shai Halevi, Candidate Multilinear Maps from Ideal Lattices theory and application of cryptographic techniques. pp. 1- 17 ,(2013) , 10.1007/978-3-642-38348-9_1
Cynthia Dwork, Frank McSherry, Kobbi Nissim, Adam Smith, Calibrating Noise to Sensitivity in Private Data Analysis Theory of Cryptography. ,vol. 3876, pp. 265- 284 ,(2006) , 10.1007/11681878_14
Guodong Guo, S.Z. Li, Kapluk Chan, Face recognition by support vector machines ieee international conference on automatic face and gesture recognition. pp. 196- 201 ,(2000) , 10.1109/AFGR.2000.840634
Alice Este, Francesco Gringoli, Luca Salgarelli, Support Vector Machines for TCP traffic classification Computer Networks. ,vol. 53, pp. 2476- 2490 ,(2009) , 10.1016/J.COMNET.2009.05.003
Latifur Khan, Mamoun Awad, Bhavani Thuraisingham, A new intrusion detection system using support vector machines and hierarchical clustering very large data bases. ,vol. 16, pp. 507- 521 ,(2007) , 10.1007/S00778-006-0002-5
A.K. Jain, Jianchang Mao, K.M. Mohiuddin, Artificial neural networks: a tutorial computational science and engineering. ,vol. 29, pp. 31- 44 ,(1996) , 10.1109/2.485891
L. R. Rabiner, B. H. Juang, Hidden Markov models for speech recognition Technometrics. ,vol. 33, pp. 251- 272 ,(1991) , 10.2307/1268779
Leonard E. Baum, Ted Petrie, Statistical Inference for Probabilistic Functions of Finite State Markov Chains Annals of Mathematical Statistics. ,vol. 37, pp. 1554- 1563 ,(1966) , 10.1214/AOMS/1177699147
Avrim Blum, Cynthia Dwork, Frank McSherry, Kobbi Nissim, Practical privacy: the SuLQ framework symposium on principles of database systems. pp. 128- 138 ,(2005) , 10.1145/1065167.1065184