Membership Inference

Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning

Authors: Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov | Published: 2020-01-14
Membership Inference
Adversarial Attack Methods
Statistical Analysis

Membership Inference Attacks Against Object Detection Models

Authors: Yeachan Park, Myungjoo Kang | Published: 2020-01-12 | Updated: 2020-01-28
Membership Inference
Adversarial attack
Machine Learning

To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers

Authors: Bijeeta Pal, Shruti Tople | Published: 2020-01-08
Prompt Injection
Membership Inference
Adversarial Learning

privGAN: Protecting GANs from membership inference attacks at low cost

Authors: Sumit Mukherjee, Yixi Xu, Anusua Trivedi, Juan Lavista Ferres | Published: 2019-12-31 | Updated: 2020-12-13
Privacy Protection Method
Membership Inference
Optimization Methods

Privacy Attacks on Network Embeddings

Authors: Michael Ellers, Michael Cochez, Tobias Schumacher, Markus Strohmaier, Florian Lemmerich | Published: 2019-12-23
Privacy Protection Method
Membership Inference
Taxonomy of Attacks

Adversarial Learning of Privacy-Preserving and Task-Oriented Representations

Authors: Taihong Xiao, Yi-Hsuan Tsai, Kihyuk Sohn, Manmohan Chandraker, Ming-Hsuan Yang | Published: 2019-11-22
Privacy-Preserving Data Mining
Poisoning
Membership Inference

Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability

Authors: Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Wenqi Wei, Lei Yu | Published: 2019-11-21
Class Imbalance
Privacy Violation
Membership Inference

Privacy Leakage Avoidance with Switching Ensembles

Authors: Rauf Izmailov, Peter Lin, Chris Mesterharm, Samyadeep Basu | Published: 2019-11-18
Privacy-Preserving Data Mining
Privacy Leakage
Membership Inference

MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection

Authors: Anuj Dubey, Rosario Cammarota, Aydin Aysu | Published: 2019-10-29 | Updated: 2019-12-02
Membership Inference
Attack Method
Effectiveness Analysis of Defense Methods

Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text

Authors: Oluwaseyi Feyisetan, Tom Diethe, Thomas Drake | Published: 2019-10-20
Privacy Protection Method
Privacy Issues
Membership Inference