Membership Inference

Evaluating Differentially Private Machine Learning in Practice

Authors: Bargav Jayaraman, David Evans | Published: 2019-02-24 | Updated: 2019-08-12
Membership Inference
Differential Privacy
Causes of Information Leakage

Applications of Machine Learning in Cryptography: A Survey

Authors: Mohammed M. Alani | Published: 2019-02-11
Membership Inference
Taxonomy of Attacks
History of Cryptography

FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions

Authors: Shaohua Li, Kaiping Xue, Chenkai Ding, Xindi Gao, David S L Wei, Tao Wan, Feng Wu | Published: 2018-11-20
Trigger Detection
Membership Inference
Cryptographic Protocol

Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls

Authors: Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Jason H. Li | Published: 2018-11-05
Online Learning
Membership Inference
Adversarial Example

Auditing Data Provenance in Text-Generation Models

Authors: Congzheng Song, Vitaly Shmatikov | Published: 2018-11-01 | Updated: 2019-05-17
Integration of Digital Signatures and Machine Learning
Privacy Assurance
Membership Inference

MLCapsule: Guarded Offline Deployment of Machine Learning as a Service

Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz | Published: 2018-08-01 | Updated: 2019-02-06
Membership Inference
Model Extraction Attack
Model Evaluation

Machine Learning with Membership Privacy using Adversarial Regularization

Authors: Milad Nasr, Reza Shokri, Amir Houmansadr | Published: 2018-07-16
Privacy Leakage
Privacy Assessment
Membership Inference

Algorithms that Remember: Model Inversion Attacks and Data Protection Law

Authors: Michael Veale, Reuben Binns, Lilian Edwards | Published: 2018-07-12 | Updated: 2018-10-15
Membership Inference
Model Inversion
Detection of Model Extraction Attacks

Towards Demystifying Membership Inference Attacks

Authors: Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu, Wenqi Wei | Published: 2018-06-28 | Updated: 2019-02-01
Membership Inference
Attack Scenario Analysis
Adversarial Learning

Killing four birds with one Gaussian process: the relation between different test-time attacks

Authors: Kathrin Grosse, Michael T. Smith, Michael Backes | Published: 2018-06-06 | Updated: 2020-11-29
Prompt leaking
Membership Inference
Watermark Evaluation