Towards a Game-Theoretic Understanding of Explanation-Based Membership Inference Attacks

被引:0
|
作者
Kumari, Kavita [1 ]
Jadliwala, Murtuza [2 ]
Jha, Sumit Kumar [3 ]
Maiti, Anindya [4 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
[2] Univ Texas San Antonio, San Antonio, TX USA
[3] Florida Int Univ, Miami, FL USA
[4] Univ Oklahoma, Norman, OK USA
关键词
D O I
10.1007/978-3-031-74835-6_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Model explanations improve the transparency of black-box machine learning (ML) models and their decisions; however, they can also enable privacy threats like membership inference attacks (MIA). Existing works have only analyzed MIA in a single interaction scenario between an adversary and the target ML model, missing the factors that influence an adversary's capability to launch MIA in repeated interactions. These works also assume the attacker knows the model's structure, which isn't always true, leading to suboptimal thresholds for identifying members. This paper examines explanation-based threshold attacks, where an adversary uses the variance in explanations through repeated interactions to perform MIA. We use a continuous-time stochastic signaling game to model these interactions. Unaware of the system's exact type (honest or malicious), the adversary plays a stopping game to gather explanation variance and compute an optimal threshold for membership determination. We propose a sound mathematical formulation to prove that such an optimal threshold exists, which can be used to launch MIA and identify conditions for a unique Markov perfect equilibrium in this dynamic system. Finally, we evaluate various factors affecting an adversary's ability to conduct MIA in repeated settings through simulations.
引用
收藏
页码:263 / 283
页数:21
相关论文
共 50 条
  • [1] The impact of change consultants' dialogic mindset: towards a game-theoretic explanation
    Nagaishi, Makoto
    FUTURE BUSINESS JOURNAL, 2023, 9 (01)
  • [2] A Game-Theoretic Explanation on Legislative Inefficiency in Korea
    Lee, Yong-Ju
    KOREAN ECONOMIC REVIEW, 2011, 27 (02): : 293 - 309
  • [3] A Game-Theoretic Approach to EDCA Remapping Attacks
    Szott, Szymon
    Konorski, Jerzy
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [4] A linguistic/game-theoretic approach to detection/explanation of propaganda
    Barfar, Arash
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 189
  • [5] Political Economy of the WrO Negotiations: A Game-Theoretic Explanation
    Rastogi, Siddhartha K.
    Sengupta, Anirban
    INTERNATIONAL NEGOTIATION-A JOURNAL OF THEORY AND PRACTICE, 2024, 29 (02): : 244 - 260
  • [6] A Game-Theoretic Model on Coalitional Attacks in Smart Grid
    Yang, Xinyu
    He, Xiaofei
    Lin, Jie
    Yu, Wei
    Yang, Qingyu
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 435 - 442
  • [7] Towards a Game-Theoretic Framework for Information Retrieval
    Zhai, ChengXiang
    SIGIR 2015: PROCEEDINGS OF THE 38TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2015, : 543 - 543
  • [8] Towards Coordination Game Formulation in Game-Theoretic Rough Sets
    Zhang, Yan
    Yao, Jing Tao
    ROUGH SETS, (IJCRS 2016), 2016, 9920 : 155 - 165
  • [9] A game-theoretic explanation of the administrative lattice in institutions of higher learning
    Ortmann, A
    Squire, R
    JOURNAL OF ECONOMIC BEHAVIOR & ORGANIZATION, 2000, 43 (03) : 377 - 391
  • [10] Paradox of crosses in association football (soccer) - a game-theoretic explanation
    Sarkar, Sumit
    JOURNAL OF QUANTITATIVE ANALYSIS IN SPORTS, 2018, 14 (01) : 25 - 36