Black-Box Based Limited Query Membership Inference Attack

被引:4
|
作者
Zhang, Yu [1 ]
Zhou, Huaping [1 ]
Wang, Pengyan [1 ]
Yang, Gaoming [1 ]
机构
[1] Anhui Univ Sci & Technol, Sch Comp Sci & Engn, Huainan 232001, Peoples R China
关键词
Data models; Training; Adaptation models; Training data; Predictive models; Generative adversarial networks; Machine learning; Membership inference attack; generative adversarial network; black-box attack; information leak;
D O I
10.1109/ACCESS.2022.3175824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional membership inference attacks usually require a large number of queries of the target model when training shadow models, and this task becomes extremely difficult when the number of queries is limited. Aiming at the problem of insufficient training data for shadow models due to the limited number of queries, we propose a membership inference attack method based on generative adversarial networks (GAN). First, we use generative adversarial networks to augment the samples obtained by a small number of queries to expand the training data of the model; Secondly, we use the improved CNN to obtain shadow models that have a higher degree of fitting on different target model structures; Finally, we evaluate the accuracy of the proposed algorithm on XgBoost, Logistic, and neural network models using public datasets MNIST and CIFAR10 in a black-box setting, and the results show that our model has an average attack accuracy of 62% and 83%, respectively. It can be seen that, compared with the existing research methods, our model can obtain better attack effects under the condition of significantly reducing the number of queries, which shows the feasibility of our proposed method in membership inference attacks.
引用
收藏
页码:55459 / 55468
页数:10
相关论文
共 50 条
  • [41] Cube-Evo: A Query-Efficient Black-Box Attack on Video Classification System
    Zhan, Yu
    Fu, Ying
    Huang, Liang
    Guo, Jianmin
    Shi, Heyuan
    Song, Houbing
    Hu, Chao
    IEEE TRANSACTIONS ON RELIABILITY, 2024, 73 (02) : 1160 - 1171
  • [42] DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space
    Liu, Jun
    Zhou, Jiantao
    Zeng, Jiandian
    Tian, Jinyu
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 4, 2024, : 3666 - 3674
  • [43] Amora: Black-box Adversarial Morphing Attack
    Wang, Run
    Juefei-Xu, Felix
    Guo, Qing
    Huang, Yihao
    Xie, Xiaofei
    Ma, Lei
    Liu, Yang
    MM '20: PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, 2020, : 1376 - 1385
  • [44] Adversarial Eigen Attack on Black-Box Models
    Zhou, Linjun
    Cui, Peng
    Zhang, Xingxuan
    Jiang, Yinan
    Yang, Shiqiang
    2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, : 15233 - 15241
  • [45] A black-Box adversarial attack for poisoning clustering
    Cina, Antonio Emanuele
    Torcinovich, Alessandro
    Pelillo, Marcello
    PATTERN RECOGNITION, 2022, 122
  • [46] Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
    Dai, Zeyu
    Liu, Shengcai
    Li, Qing
    Tang, Ke
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2023, 14 (03)
  • [47] A Distributed Biased Boundary Attack Method in Black-Box Attack
    Xiang, Fengtao
    Xu, Jiahui
    Zhang, Wanpeng
    Wang, Weidong
    APPLIED SCIENCES-BASEL, 2021, 11 (21):
  • [48] Constructive Membership Testing in Black-Box Classical Groups
    Ambrose, Sophie
    Murray, Scott H.
    Praeger, Cheryl E.
    Schneider, Csaba
    MATHEMATICAL SOFTWARE - ICMS 2010, 2010, 6327 : 54 - +
  • [49] Exploiting natural language services: a polarity based black-box attack
    Fatma Gumus
    M. Fatih Amasyali
    Frontiers of Computer Science, 2022, 16
  • [50] Local Black-box Adversarial Attack based on Random Segmentation Channel
    Xu, Li
    Yang, Zejin
    Guo, Huiting
    Wan, Xu
    Fan, Chunlong
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1437 - 1442