“…A substantial body of literature followed this work extending the attacks to different setting such as white box analysis [Nasr et al, 2019, Sablayrolles et al, 2019, Leino and Fredrikson, 2020, label-only access [Li andZhang, 2020, Choquette-Choo et al, 2021], federated learning [Nasr et al, 2019, transfer learning [Zou et al, 2020] and different types of data, models such as aggregate location data [Pyrgelis et al, 2017], generative models [Hayes et al, 2019], language models [Carlini et al, 2019, Carlini et al, 2020, sentence embeddings [Song and Raghunathan, 2020], and speech recognition models [Shah et al, 2021]. Multiple works have looked at improving the attack methodology through a more fine grained analysis or by reducing the background knowledge and the compute power required to execute the attack [Long et al, 2018, Song and Mittal, 2021, Salem et al, 2018. All these works follow the same attack framework for membership inference, but they either exploit a slightly different signal that is correlated with membership of a point in the training set or find an efficient way to exploit the already known signals.…”