Membership Inference

Membership Inference via Backdooring

Authors: Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun, Xuyun Zhang | Published: 2022-06-10
Attack Methods against DFL
Membership Inference
Adversarial Attack Methods

Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes?

Authors: Huiyu Li, Nicholas Ayache, Hervé Delingette | Published: 2022-06-07
Attack Methods against DFL
Privacy Assessment
Membership Inference

Subject Membership Inference Attacks in Federated Learning

Authors: Anshuman Suri, Pallika Kanani, Virendra J. Marathe, Daniel W. Peterson | Published: 2022-06-07 | Updated: 2023-06-02
Attack Methods against DFL
Membership Inference
Federated Learning

Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement

Authors: Alex Shamis, Peter Pietzuch, Antoine Delignat-Lavaud, Andrew Paverd, Manuel Costa | Published: 2022-05-31
Membership Inference
Trust Evaluation
Communication Model

SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning

Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea | Published: 2022-05-20 | Updated: 2022-09-08
Backdoor Attack
Membership Inference
Robustness Evaluation

A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection

Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze | Published: 2022-05-18
Membership Inference
Performance Evaluation
Attack Detection

SoK: The Impact of Unlabelled Data in Cyberthreat Detection

Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18
Dataset evaluation
Membership Inference
Performance Evaluation

Lessons Learned: Defending Against Property Inference Attacks

Authors: Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath | Published: 2022-05-18 | Updated: 2023-10-09
Data Preprocessing
Membership Inference
Performance Evaluation

l-Leaks: Membership Inference Attacks with Logits

Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13
Performance Evaluation
Membership Inference
Attack Method

How to Combine Membership-Inference Attacks on Multiple Updated Models

Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12
Performance Evaluation
Membership Inference
Attack Method