Membership inference attacks on machine learning: A survey

H Hu, Z Salcic, L Sun, G Dobbie, PS Yu… - ACM Computing Surveys …, 2022 - dl.acm.org
Machine learning (ML) models have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …

Anonymization techniques for privacy preserving data publishing: A comprehensive survey

A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …

Reducing write amplification in flash by death-time prediction of logical block addresses

C Chakraborttii, H Litz - Proceedings of the 14th ACM International …, 2021 - dl.acm.org
Flash-based solid state drives lack support for in-place updates, and hence deploy a flash
translation layer to absorb the writes. For this purpose, SSDs implement a log-structured …

[HTML][HTML] A survey on membership inference attacks and defenses in Machine Learning

J Niu, P Liu, X Zhu, K Shen, Y Wang, H Chi… - Journal of Information …, 2024 - Elsevier
Membership inference (MI) attacks mainly aim to infer whether a data record was used to
train a target model or not. Due to the serious privacy risks, MI attacks have been attracting a …

A Survey on Privacy in Graph Neural Networks: Attacks, Preservation, and Applications

Y Zhang, Y Zhao, Z Li, X Cheng, Y Wang… - arXiv preprint arXiv …, 2023 - arxiv.org
Graph Neural Networks (GNNs) have gained significant attention owing to their ability to
handle graph-structured data and the improvement in practical applications. However, many …

Invernet: An inversion attack framework to infer fine-tuning datasets through word embeddings

I Hayet, Z Yao, B Luo - Findings of the Association for …, 2022 - aclanthology.org
Word embedding aims to learn the dense representation of words and has become a
regular input preparation in many NLP tasks. Due to the data and computation intensive …

FaceLeaks: Inference attacks against transfer learning models via black-box queries

SP Liew, T Takahashi - arXiv preprint arXiv:2010.14023, 2020 - arxiv.org
Transfer learning is a useful machine learning framework that allows one to build task-
specific models (student models) without significantly incurring training costs using a single …

Earning extra performance from restrictive feedbacks

J Li, Y Pan, Y Lyu, Y Yao, Y Sui… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Many machine learning applications encounter situations where model providers are
required to further refine the previously trained model so as to gratify the specific need of …

[PDF][PDF] 机器学习中成员推理攻击和防御研究综述

牛俊, 马骁骥, 陈颖, 张歌, 何志鹏, 侯哲贤… - Journal of Cyber …, 2022 - jcs.iie.ac.cn
摘要机器学习被广泛应用于各个领域, 已成为推动各行业革命的强大动力,
极大促进了人工智能的繁荣与发展. 同时, 机器学习模型的训练和预测均需要大量数据 …

How Train–Test Leakage Affects Zero-Shot Retrieval

M Fröbe, C Akiki, M Potthast, M Hagen - International Symposium on …, 2022 - Springer
Neural retrieval models are often trained on (subsets of) the millions of queries of the MS
MARCO/ORCAS datasets and then tested on the 250 Robust04 queries or other TREC …