“…To address the challenges of achieving formal utility-loss guarantees, e.g., 0 label loss and bounded confidence score distortion, we design new methods to find adversarial examples. Other than membership inference attacks, many other attacks rely on machine learning classifiers, e.g., attribute inference attacks [11,17,28], website fingerprinting attacks [7,22,29,46,67], side-channel attacks [73], location attacks [5,45,52,72], and author identification attacks [8,41]. For instance, online social network users are vulnerable to attribute inference attacks, in which an attacker leverages a machine learning classifier to infer users' private attributes (e.g., gender, political view, and sexual orientation) using their public data (e.g., page likes) on social networks.…”