QuerySnout: Automating the discovery of attribute inference attacks against query-based systems

AM Cretu, F Houssiau, A Cully… - Proceedings of the 2022 …, 2022 - dl.acm.org
Although query-based systems (QBS) have become one of the main solutions to share data
anonymously, building QBSes that robustly protect the privacy of individuals contributing to …

Differentially private data generative models

Q Chen, C Xiang, M Xue, B Li, N Borisov… - arXiv preprint arXiv …, 2018 - arxiv.org
Deep neural networks (DNNs) have recently been widely adopted in various applications,
and such success is largely due to a combination of algorithmic breakthroughs, computation …

Regression analysis with differential privacy preserving

X Fang, F Yu, G Yang, Y Qu - IEEE access, 2019 - ieeexplore.ieee.org
In the field of data mining, protecting sensitive data from being leaked is part of the focuses
of current research. As a strict and provable definition of privacy model, differential privacy …

Querying little is enough: model inversion attack via latent information

K Mo, T Huang, X Xiang - Machine Learning for Cyber Security: Third …, 2020 - Springer
With the development of machine learning (ML) technology, various online intelligent
services use ML models to provide predictions. However, attacker may obtain privacy …

Towards measuring membership privacy

Y Long, V Bindschaedler, CA Gunter - arXiv preprint arXiv:1712.09136, 2017 - arxiv.org
Machine learning models are increasingly made available to the masses through public
query interfaces. Recent academic work has demonstrated that malicious users who can …

Model protection: Real-time privacy-preserving inference service for model privacy at the edge

J Hou, H Liu, Y Liu, Y Wang, PJ Wan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Major cloud service providers with well-equipped infrastructure, experienced machine
learning (ML) expertise, and enriched training datasets are building ML-as-a-Service …

Privacy Backdoors: Stealing Data with Corrupted Pretrained Models

S Feng, F Tramèr - arXiv preprint arXiv:2404.00473, 2024 - arxiv.org
Practitioners commonly download pretrained machine learning models from open
repositories and finetune them to fit specific applications. We show that this practice …

[PDF][PDF] Membership inference attack against differentially private deep learning model.

MA Rahman, T Rahman, R Laganière, N Mohammed… - Trans. Data Priv., 2018 - tdp.cat
The unprecedented success of deep learning is largely dependent on the availability of
massive amount of training data. In many cases, these data are crowd-sourced and may …

Differentially private counterfactuals via functional mechanism

F Yang, Q Feng, K Zhou, J Chen, X Hu - arXiv preprint arXiv:2208.02878, 2022 - arxiv.org
Counterfactual, serving as one emerging type of model explanation, has attracted tons of
attentions recently from both industry and academia. Different from the conventional feature …

Preserving user privacy for machine learning: Local differential privacy or federated machine learning?

H Zheng, H Hu, Z Han - IEEE Intelligent Systems, 2020 - ieeexplore.ieee.org
The growing number of mobile and IoT devices has nourished many intelligent applications.
In order to produce high-quality machine learning models, they constantly access and …