Attribute-Based Membership Inference Attacks and Defenses on GANs

被引:1
|
作者
Sun, Hui [1 ]
Zhu, Tianqing [2 ]
Li, Jie [1 ]
Ji, Shoulin [3 ]
Zhou, Wanlei [4 ]
机构
[1] China Univ Geosci, Wuhan 430079, Hubei, Peoples R China
[2] Univ Technol Sydney, Sydney, NSW 2007, Australia
[3] Zhejiang Univ, Hangzhou 310027, Zhejiang, Peoples R China
[4] City Univ Macau, Taipa, Macao, Peoples R China
关键词
Training; Image reconstruction; Generators; Generative adversarial networks; Codes; Privacy; Training data; Membership inference attack; generative adversarial networks; privacy leakage;
D O I
10.1109/TDSC.2023.3305591
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With breakthroughs in high-resolution image generation, applications for disentangled generative adversarial networks (GANs) have attracted much attention. At the same time, the privacy issues associated with GAN models have been raising many concerns. Membership inference attacks (MIAs), where an adversary attempts to determine whether or not a sample has been used to train the victim model, are a major risk with GANs. In prior research, scholars have shown that successful MIAs can be mounted by leveraging overfit images. However, high-resolution images make the existing MIAs fail due to their complexity. And the nature of disentangled GANs is such that the attributes are overfitting, which means that, for an MIA to be successful, it must likely be based on overfitting attributes. Furthermore, given the empirical difficulties with obtaining independent and identically distributed (IID) candidate samples, choosing the non-trivial attributes of candidate samples as the target for exploring overfitting would be a more preferable choice. Hence, in this article, we propose a series of attribute-based MIAs that considers both black-box and white-box settings. The attacks are performed on the generator, and the inferences are derived by overfitting the non-trivial attributes. Additionally, we put forward a novel perspective on model generalization and a possible defense by evaluating the overfitting status of each individual attribute. A series of empirical evaluations in both settings demonstrate that the attacks remain stable and successful when using non-IID candidate samples. Further experiments illustrate that each attribute exhibits a distinct overfitting status. Moreover, manually generalizing highly overfitting attributes significantly reduces the risk of privacy leaks.
引用
收藏
页码:2376 / 2393
页数:18
相关论文
共 50 条
  • [1] Defenses to Membership Inference Attacks: A Survey
    Hu, Li
    Yan, Anli
    Yan, Hongyang
    Li, Jin
    Huang, Teng
    Zhang, Yingying
    Dong, Changyu
    Yang, Chunsheng
    ACM COMPUTING SURVEYS, 2024, 56 (04)
  • [2] Membership Inference Attacks and Defenses in Classification Models
    Li, Jiacheng
    Li, Ninghui
    Ribeiro, Bruno
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 5 - 16
  • [3] Membership Inference Attacks and Defenses in Neural Network Pruning
    Yuan, Xiaoyong
    Zhang, Lan
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 4561 - 4578
  • [4] Membership Inference Attacks and Defenses in Federated Learning: A Survey
    Bai, Li
    Hu, Haibo
    Ye, Qingqing
    Li, Haoyang
    Wang, Leixia
    Xu, Jianliang
    ACM COMPUTING SURVEYS, 2025, 57 (04)
  • [5] Attribute-based Prevention of Phishing Attacks
    Atighetchi, Michael
    Pal, Partha
    2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, 2009, : 266 - 269
  • [6] Membership Inference Attacks against GANs by Leveraging Over-representation Regions
    Hu, Hailong
    Pang, Jun
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2387 - 2389
  • [7] Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models
    Zhang, Guangsheng
    Liu, Bo
    Zhu, Tianqing
    Ding, Ming
    Zhou, Wanlei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1435 - 1449
  • [8] Attribute-based fracture inference in a faulted carbonate play
    Boon, Xiang Ying Rebecca
    Bacon, Randy
    Interpretation-A Journal of Subsurface Characterization, 2014, 2 (01): : SA77 - SA82
  • [9] Multiauthority Attribute-Based Encryption With Dynamic Membership From Lattices
    Zhuang, Er-Shuo
    Fan, Chun-, I
    Kuo, I-Hua
    IEEE ACCESS, 2022, 10 : 58254 - 58267
  • [10] Arbitrary-State Attribute-Based Encryption with Dynamic Membership
    Fan, Chun-I
    Huang, Vincent Shi-Ming
    Ruan, He-Ming
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (08) : 1951 - 1961