Membership inference attacks on machine learning: A survey
Machine learning (ML) models have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …
image classification, text generation, audio recognition, and graph data analysis. However …
Defenses to membership inference attacks: A survey
Machine learning (ML) has gained widespread adoption in a variety of fields, including
computer vision and natural language processing. However, ML models are vulnerable to …
computer vision and natural language processing. However, ML models are vulnerable to …
Are diffusion models vulnerable to membership inference attacks?
Diffusion-based generative models have shown great potential for image synthesis, but
there is a lack of research on the security and privacy risks they may pose. In this paper, we …
there is a lack of research on the security and privacy risks they may pose. In this paper, we …
Sneakyprompt: Jailbreaking text-to-image generative models
Text-to-image generative models such as Stable Diffusion and DALL• E raise many ethical
concerns due to the generation of harmful images such as Not-Safe-for-Work (NSFW) ones …
concerns due to the generation of harmful images such as Not-Safe-for-Work (NSFW) ones …
Membership leakage in label-only exposures
Machine learning (ML) has been widely adopted in various privacy-critical applications, eg,
face recognition and medical image analysis. However, recent research has shown that ML …
face recognition and medical image analysis. However, recent research has shown that ML …
{CodexLeaks}: Privacy leaks from code generation language models in {GitHub} copilot
Code generation language models are trained on billions of lines of source code to provide
code generation and auto-completion features, like those offered by code assistant GitHub …
code generation and auto-completion features, like those offered by code assistant GitHub …
“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Federaser: Enabling efficient client-level data removal from federated learning models
Federated learning (FL) has recently emerged as a promising distributed machine learning
(ML) paradigm. Practical needs of the" right to be forgotten" and countering data poisoning …
(ML) paradigm. Practical needs of the" right to be forgotten" and countering data poisoning …
Encodermi: Membership inference against pre-trained encoders in contrastive learning
Given a set of unlabeled images or (image, text) pairs, contrastive learning aims to pre-train
an image encoder that can be used as a feature extractor for many downstream tasks. In this …
an image encoder that can be used as a feature extractor for many downstream tasks. In this …
Machine unlearning: Solutions and challenges
Machine learning models may inadvertently memorize sensitive, unauthorized, or malicious
data, posing risks of privacy breaches, security vulnerabilities, and performance …
data, posing risks of privacy breaches, security vulnerabilities, and performance …