Membership inference attacks on machine learning: A survey
Machine learning (ML) models have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …
image classification, text generation, audio recognition, and graph data analysis. However …
A survey of privacy attacks in machine learning
As machine learning becomes more widely used, the need to study its implications in
security and privacy becomes more urgent. Although the body of work in privacy has been …
security and privacy becomes more urgent. Although the body of work in privacy has been …
Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models
Machine learning (ML) has become a core component of many real-world applications and
training data is a key factor that drives current progress. This huge success has led Internet …
training data is a key factor that drives current progress. This huge success has led Internet …
Membership leakage in label-only exposures
Machine learning (ML) has been widely adopted in various privacy-critical applications, eg,
face recognition and medical image analysis. However, recent research has shown that ML …
face recognition and medical image analysis. However, recent research has shown that ML …
Memguard: Defending against black-box membership inference attacks via adversarial examples
In a membership inference attack, an attacker aims to infer whether a data sample is in a
target classifier's training dataset or not. Specifically, given a black-box access to the target …
target classifier's training dataset or not. Specifically, given a black-box access to the target …
Gan-leaks: A taxonomy of membership inference attacks against generative models
Deep learning has achieved overwhelming success, spanning from discriminative models to
generative models. In particular, deep generative models have facilitated a new level of …
generative models. In particular, deep generative models have facilitated a new level of …
Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise
F Liu, Y Wen, D Zhang, X Jiang, X **ng… - Proceedings of the 2019 …, 2019 - dl.acm.org
Conventional attacks of insider employees and emerging APT are both major threats for the
organizational information system. Existing detections mainly concentrate on users' behavior …
organizational information system. Existing detections mainly concentrate on users' behavior …
When machine unlearning jeopardizes privacy
The right to be forgotten states that a data owner has the right to erase their data from an
entity storing it. In the context of machine learning (ML), the right to be forgotten requires an …
entity storing it. In the context of machine learning (ML), the right to be forgotten requires an …
{Updates-Leak}: Data set inference and reconstruction attacks in online learning
Machine learning (ML) has progressed rapidly during the past decade and the major factor
that drives such development is the unprecedented large-scale data. As data generation is a …
that drives such development is the unprecedented large-scale data. As data generation is a …
Inference attacks against graph neural networks
Graph is an important data representation ubiquitously existing in the real world. However,
analyzing the graph data is computationally difficult due to its non-Euclidean nature. Graph …
analyzing the graph data is computationally difficult due to its non-Euclidean nature. Graph …