E De Cristofaro - IEEE Security & Privacy, 2021 - ieeexplore.ieee.org
This article reviews privacy challenges in machine learning and provides a critical overview of the relevant research literature. The possible adversarial models are discussed, a wide …
E De Cristofaro - arXiv preprint arXiv:2005.08679, 2020 - arxiv.org
Over the past few years, providers such as Google, Microsoft, and Amazon have started to provide customers with access to software interfaces allowing them to easily embed …
S Yeom, I Giacomelli, A Menaged… - Journal of …, 2020 - content.iospress.com
Abstract Machine learning algorithms, when applied to sensitive data, pose a distinct threat to privacy. A growing body of prior work demonstrates that models produced by these …
The arms race between attacks and defenses for machine learning models has come to a forefront in recent years, in both the security community and the privacy community …
M Al-Rubaie, JM Chang - IEEE Security & Privacy, 2019 - ieeexplore.ieee.org
For privacy concerns to be addressed adequately in today's machine-learning (ML) systems, the knowledge gap between the ML and privacy communities must be bridged. This article …
M Xue, C Yuan, H Wu, Y Zhang, W Liu - IEEE Access, 2020 - ieeexplore.ieee.org
Machine learning has been pervasively used in a wide range of applications due to its technical breakthroughs in recent years. It has demonstrated significant success in dealing …
S Yeom, I Giacomelli, M Fredrikson… - 2018 IEEE 31st …, 2018 - ieeexplore.ieee.org
Machine learning algorithms, when applied to sensitive data, pose a distinct threat to privacy. A growing body of prior work demonstrates that models produced by these …
L Song, P Mittal - 30th USENIX Security Symposium (USENIX Security …, 2021 - usenix.org
Machine learning models are prone to memorizing sensitive data, making them vulnerable to membership inference attacks in which an adversary aims to guess if an input sample was …
Deploying machine learning models in production may allow adversaries to infer sensitive information about training data. There is a vast literature analyzing different types of …