Membership Inference

Trade-offs and Guarantees of Adversarial Representation Learning for Information Obfuscation

Authors: Han Zhao, Jianfeng Chi, Yuan Tian, Geoffrey J. Gordon | Published: 2019-06-19 | Updated: 2020-10-25
Privacy Protection
Membership Inference
Optimization Problem

DAWN: Dynamic Adversarial Watermarking of Neural Networks

Authors: Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan | Published: 2019-06-03 | Updated: 2021-07-16
Membership Inference
Adversarial Example
Watermarking Technology

Disparate Vulnerability to Membership Inference Attacks

Authors: Bogdan Kulynych, Mohammad Yaghini, Giovanni Cherubin, Michael Veale, Carmela Troncoso | Published: 2019-06-02 | Updated: 2021-09-16
Dataset Analysis
Privacy Assessment
Membership Inference

Bypassing Backdoor Detection Algorithms in Deep Learning

Authors: Te Juin Lester Tan, Reza Shokri | Published: 2019-05-31 | Updated: 2020-06-06
Pruning Method
Membership Inference
Adversarial Attack Methods

Quantifying the Privacy Risks of Learning High-Dimensional Graphical Models

Authors: Sasi Kumar Murakonda, Reza Shokri, George Theodorakopoulos | Published: 2019-05-29 | Updated: 2021-02-17
Privacy Enhancing Technology
Membership Inference
Information-Theoretic Evaluation

Privacy Risks of Securing Machine Learning Models against Adversarial Examples

Authors: Liwei Song, Reza Shokri, Prateek Mittal | Published: 2019-05-24 | Updated: 2019-08-25
Backdoor Attack
Membership Inference
Adversarial Example

A framework for the extraction of Deep Neural Networks by leveraging public data

Authors: Soham Pal, Yash Gupta, Aditya Shukla, Aditya Kanade, Shirish Shevade, Vinod Ganapathy | Published: 2019-05-22
Data Collection
Membership Inference
Model Performance Evaluation

Evaluating Differentially Private Machine Learning in Practice

Authors: Bargav Jayaraman, David Evans | Published: 2019-02-24 | Updated: 2019-08-12
Membership Inference
Differential Privacy
Causes of Information Leakage

Applications of Machine Learning in Cryptography: A Survey

Authors: Mohammed M. Alani | Published: 2019-02-11
Membership Inference
Taxonomy of Attacks
History of Cryptography

FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions

Authors: Shaohua Li, Kaiping Xue, Chenkai Ding, Xindi Gao, David S L Wei, Tao Wan, Feng Wu | Published: 2018-11-20
Trigger Detection
Membership Inference
Cryptographic Protocol