Membership Inference

Leakage of Dataset Properties in Multi-Party Machine Learning

Authors: Wanrong Zhang, Shruti Tople, Olga Ohrimenko | Published: 2020-06-12 | Updated: 2021-06-17
Privacy Loss Analysis
Membership Inference
Attack Type

Trade-offs between membership privacy & adversarially robust learning

Authors: Jamie Hayes | Published: 2020-06-08 | Updated: 2022-01-08
Membership Inference
Overfitting

Sponge Examples: Energy-Latency Attacks on Neural Networks

Authors: Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, Ross Anderson | Published: 2020-06-05 | Updated: 2021-05-12
Energy Management
Poisoning
Membership Inference

An Overview of Privacy in Machine Learning

Authors: Emiliano De Cristofaro | Published: 2020-05-18
Privacy Technique
Membership Inference
Machine Learning Method

Perturbing Inputs to Prevent Model Stealing

Authors: Justin Grana | Published: 2020-05-12
Membership Inference
Attack Detection
Linear Model

When Machine Unlearning Jeopardizes Privacy

Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2020-05-05 | Updated: 2021-09-14
Poisoning
Membership Inference
Privacy Protection in Machine Learning

Private Dataset Generation Using Privacy Preserving Collaborative Learning

Authors: Amit Chaulwar | Published: 2020-04-28
Privacy Protection
Membership Inference
Federated Learning System

Privacy in Deep Learning: A Survey

Authors: Fatemehsadat Mireshghallah, Mohammadkazem Taram, Praneeth Vepakomma, Abhishek Singh, Ramesh Raskar, Hadi Esmaeilzadeh | Published: 2020-04-25 | Updated: 2020-11-07
Privacy Enhancing Technology
Membership Inference
Deep Learning Technology

Information Leakage in Embedding Models

Authors: Congzheng Song, Ananth Raghunathan | Published: 2020-03-31 | Updated: 2020-08-19
Privacy Protection Method
Privacy Issues
Membership Inference

Systematic Evaluation of Privacy Risks of Machine Learning Models

Authors: Liwei Song, Prateek Mittal | Published: 2020-03-24 | Updated: 2020-12-09
Privacy Protection Method
Membership Inference
Defense Method