A two-stage model extraction attack on GANs with a small collected dataset

H Sun, T Zhu, W Chang, W Zhou - Computers & Security, 2024 - Elsevier
Due to their capacity for image generation, GAN models may be considered as a solution for
the use of private data, which enhances their commercial value. However, unlike …

Black-Box Training Data Identification in GANs via Detector Networks

L Olagoke, S Vadhan, S Neel - arXiv preprint arXiv:2310.12063, 2023 - arxiv.org
Since their inception Generative Adversarial Networks (GANs) have been popular
generative models across images, audio, video, and tabular data. In this paper we study …

privGAN: Protecting GANs from membership inference attacks at low cost

S Mukherjee, Y Xu, A Trivedi, JL Ferres - arXiv preprint arXiv:2001.00071, 2019 - arxiv.org
Generative Adversarial Networks (GANs) have made releasing of synthetic images a viable
approach to share data without releasing the original dataset. It has been shown that such …

Attribute-based membership inference attacks and defenses on GANs

H Sun, T Zhu, J Li, S Ji, W Zhou - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With breakthroughs in high-resolution image generation, applications for disentangled
generative adversarial networks (GANs) have attracted much attention. At the same time, the …

privGAN: Protecting GANs from membership inference attacks at low cost to utility

S Mukherjee, Y Xu, A Trivedi… - … on Privacy Enhancing …, 2021 - petsymposium.org
Generative Adversarial Networks (GANs) have made releasing of synthetic images a viable
approach to share data without releasing the original dataset. It has been shown that such …

Membership inference attacks against GANs by leveraging over-representation regions

H Hu, J Pang - Proceedings of the 2021 ACM SIGSAC Conference on …, 2021 - dl.acm.org
Generative adversarial networks (GANs) have made unprecedented performance in image
synthesis and play a key role in various downstream applications of computer vision …

Stealing machine learning models: Attacks and countermeasures for generative adversarial networks

H Hu, J Pang - Proceedings of the 37th Annual Computer Security …, 2021 - dl.acm.org
Model extraction attacks aim to duplicate a machine learning model through query access to
a target model. Early studies mainly focus on discriminative models. Despite the success …

Attributing and detecting fake images generated by known GANs

M Joslin, S Hao - 2020 IEEE Security and Privacy Workshops …, 2020 - ieeexplore.ieee.org
The quality of GAN-generated fake images has improved significantly, and recent GAN
approaches, such as StyleGAN, achieve near indistinguishability from real images for the …

Detecting and simulating artifacts in gan fake images

X Zhang, S Karaman, SF Chang - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
To detect GAN generated images, conventional supervised machine learning algorithms
require collecting a large number of real images as well as fake images generated by the …

Privacy Re-identification Attacks on Tabular GANs

A Alshantti, A Rasheed, F Westad - arXiv preprint arXiv:2404.00696, 2024 - arxiv.org
Generative models are subject to overfitting and thus may potentially leak sensitive
information from the training data. In this work. we investigate the privacy risks that can …