Membership inference attacks on machine learning: A survey
Machine learning (ML) models have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …
image classification, text generation, audio recognition, and graph data analysis. However …
A survey on trustworthy edge intelligence: From security and reliability to transparency and sustainability
Edge Intelligence (EI) integrates Edge Computing (EC) and Artificial Intelligence (AI) to push
the capabilities of AI to the network edge for real-time, efficient and secure intelligent …
the capabilities of AI to the network edge for real-time, efficient and secure intelligent …
Systematic evaluation of privacy risks of machine learning models
Machine learning models are prone to memorizing sensitive data, making them vulnerable
to membership inference attacks in which an adversary aims to guess if an input sample was …
to membership inference attacks in which an adversary aims to guess if an input sample was …
Membership inference attacks by exploiting loss trajectory
Machine learning models are vulnerable to membership inference attacks in which an
adversary aims to predict whether or not a particular sample was contained in the target …
adversary aims to predict whether or not a particular sample was contained in the target …
Defenses to membership inference attacks: A survey
L Hu, A Yan, H Yan, J Li, T Huang, Y Zhang… - ACM Computing …, 2023 - dl.acm.org
Machine learning (ML) has gained widespread adoption in a variety of fields, including
computer vision and natural language processing. However, ML models are vulnerable to …
computer vision and natural language processing. However, ML models are vulnerable to …
{ML-Doctor}: Holistic risk assessment of inference attacks against machine learning models
Inference attacks against Machine Learning (ML) models allow adversaries to learn
sensitive information about training data, model parameters, etc. While researchers have …
sensitive information about training data, model parameters, etc. While researchers have …
Cronus: Robust and heterogeneous collaborative learning with black-box knowledge transfer
Collaborative (federated) learning enables multiple parties to train a model without sharing
their private data, but through repeated sharing of the parameters of their local models …
their private data, but through repeated sharing of the parameters of their local models …
Membership inference attacks against recommender systems
Recently, recommender systems have achieved promising performances and become one
of the most widely used web applications. However, recommender systems are often trained …
of the most widely used web applications. However, recommender systems are often trained …
Quantifying privacy leakage in graph embedding
Graph embeddings have been proposed to map graph data to low dimensional space for
downstream processing (eg, node classification or link prediction). With the increasing …
downstream processing (eg, node classification or link prediction). With the increasing …
Mitigating membership inference attacks by {Self-Distillation} through a novel ensemble architecture
Membership inference attacks are a key measure to evaluate privacy leakage in machine
learning (ML) models. It is important to train ML models that have high membership privacy …
learning (ML) models. It is important to train ML models that have high membership privacy …