2021
DOI: 10.1109/tsc.2019.2897554
|View full text |Cite
|
Sign up to set email alerts
|

Demystifying Membership Inference Attacks in Machine Learning as a Service

Abstract: Membership inference attacks seek to infer membership of individual training instances of a model to which an adversary has black-box access through a machine learning-as-a-service API. In providing an in-depth characterization of membership privacy risks against machine learning models, this paper presents a comprehensive study towards demystifying membership inference attacks from two complimentary perspectives. First, we provide a generalized formulation of the development of a black-box membership inferenc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
123
0

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 196 publications
(141 citation statements)
references
References 35 publications
1
123
0
Order By: Relevance
“…We also advocate multi-tier strategic ensemble learning [17,36]. We argue that such cross-layer hybrid approach can combine several ensemble strategies to further increase the diversity of ensemble members, providing more robust safeguards for the inputs to DNN models, the training of DNN models and the outputs of DNN models.…”
Section: Ensemble Consensus Methodsmentioning
confidence: 99%
“…We also advocate multi-tier strategic ensemble learning [17,36]. We argue that such cross-layer hybrid approach can combine several ensemble strategies to further increase the diversity of ensemble members, providing more robust safeguards for the inputs to DNN models, the training of DNN models and the outputs of DNN models.…”
Section: Ensemble Consensus Methodsmentioning
confidence: 99%
“…We note that all experiments evaluated the attack model against an equal number of instances in the target training dataset D as those not in D. The baseline membership inference accuracy is therefore 50%. We refer readers to [14] for more details on these datasets and experimental set up.…”
Section: Datasetmentioning
confidence: 99%
“…Figure 1 gives a workflow sketch of membership inference attack generation algorithm. We use the shadow model technique documented in [17] and [14] to describe the attack generation process of membership inference attacks, while noting that many of the processes may be applicable to other attack generation techniques.…”
Section: B Attack Generationmentioning
confidence: 99%
See 2 more Smart Citations