Attribute-Based Membership Inference Attacks and Defenses on GANs

被引:1
|
作者
Sun, Hui [1 ]
Zhu, Tianqing [2 ]
Li, Jie [1 ]
Ji, Shoulin [3 ]
Zhou, Wanlei [4 ]
机构
[1] China Univ Geosci, Wuhan 430079, Hubei, Peoples R China
[2] Univ Technol Sydney, Sydney, NSW 2007, Australia
[3] Zhejiang Univ, Hangzhou 310027, Zhejiang, Peoples R China
[4] City Univ Macau, Taipa, Macao, Peoples R China
关键词
Training; Image reconstruction; Generators; Generative adversarial networks; Codes; Privacy; Training data; Membership inference attack; generative adversarial networks; privacy leakage;
D O I
10.1109/TDSC.2023.3305591
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With breakthroughs in high-resolution image generation, applications for disentangled generative adversarial networks (GANs) have attracted much attention. At the same time, the privacy issues associated with GAN models have been raising many concerns. Membership inference attacks (MIAs), where an adversary attempts to determine whether or not a sample has been used to train the victim model, are a major risk with GANs. In prior research, scholars have shown that successful MIAs can be mounted by leveraging overfit images. However, high-resolution images make the existing MIAs fail due to their complexity. And the nature of disentangled GANs is such that the attributes are overfitting, which means that, for an MIA to be successful, it must likely be based on overfitting attributes. Furthermore, given the empirical difficulties with obtaining independent and identically distributed (IID) candidate samples, choosing the non-trivial attributes of candidate samples as the target for exploring overfitting would be a more preferable choice. Hence, in this article, we propose a series of attribute-based MIAs that considers both black-box and white-box settings. The attacks are performed on the generator, and the inferences are derived by overfitting the non-trivial attributes. Additionally, we put forward a novel perspective on model generalization and a possible defense by evaluating the overfitting status of each individual attribute. A series of empirical evaluations in both settings demonstrate that the attacks remain stable and successful when using non-IID candidate samples. Further experiments illustrate that each attribute exhibits a distinct overfitting status. Moreover, manually generalizing highly overfitting attributes significantly reduces the risk of privacy leaks.
引用
收藏
页码:2376 / 2393
页数:18
相关论文
共 50 条
  • [21] Membership Inference Attacks: Analysis and Mitigation
    Shuvo, Md Shamimur Rahman
    Alhadidi, Dima
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1411 - 1420
  • [22] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [23] Attribute-based learning
    Bratko, I
    Cestnik, B
    Kononenko, I
    AI COMMUNICATIONS, 1996, 9 (01) : 27 - 32
  • [24] Attribute-based signature with AT
    Ma, Chun-Guang
    Shi, Lan
    Wang, Ding
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2013, 42 (03): : 410 - 414
  • [25] Attribute-Based Signatures
    Maji, Hemanta K.
    Prabhakaran, Manoj
    Rosulek, Mike
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 376 - +
  • [26] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    Cryptology and Information Security Series, 2009, 2 : 156 - 168
  • [27] CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model
    Fan, Chun-, I
    Tseng, Yi-Fan
    Feng, Cheng-Chun
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [28] Ciphertext Outdate Attacks on the Revocable Attribute-Based Encryption Scheme With Time Encodings
    Lee, Kwangsu
    IEEE ACCESS, 2019, 7 : 165122 - 165126
  • [29] Black-box membership inference attacks based on shadow model
    Han Zhen
    Zhou Wen'an
    Han Xiaoxuan
    Wu Jie
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2024, 31 (04) : 1 - 16
  • [30] Black-box membership inference attacks based on shadow model
    Zhen, Han
    Wen’An, Zhou
    Xiaoxuan, Han
    Jie, Wu
    Journal of China Universities of Posts and Telecommunications, 2024, 31 (04): : 1 - 16