Membership inference attacks on machine learning: A survey

H Hu, Z Salcic, L Sun, G Dobbie, PS Yu… - ACM Computing Surveys …, 2022 - dl.acm.org
Machine learning (ML) models have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …

A survey of privacy attacks in machine learning

M Rigaki, S Garcia - ACM Computing Surveys, 2023 - dl.acm.org
As machine learning becomes more widely used, the need to study its implications in
security and privacy becomes more urgent. Although the body of work in privacy has been …

Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models

A Salem, Y Zhang, M Humbert, P Berrang… - arxiv preprint arxiv …, 2018 - arxiv.org
Machine learning (ML) has become a core component of many real-world applications and
training data is a key factor that drives current progress. This huge success has led Internet …

Membership leakage in label-only exposures

Z Li, Y Zhang - Proceedings of the 2021 ACM SIGSAC Conference on …, 2021 - dl.acm.org
Machine learning (ML) has been widely adopted in various privacy-critical applications, eg,
face recognition and medical image analysis. However, recent research has shown that ML …

Memguard: Defending against black-box membership inference attacks via adversarial examples

J Jia, A Salem, M Backes, Y Zhang… - Proceedings of the 2019 …, 2019 - dl.acm.org
In a membership inference attack, an attacker aims to infer whether a data sample is in a
target classifier's training dataset or not. Specifically, given a black-box access to the target …

Gan-leaks: A taxonomy of membership inference attacks against generative models

D Chen, N Yu, Y Zhang, M Fritz - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
Deep learning has achieved overwhelming success, spanning from discriminative models to
generative models. In particular, deep generative models have facilitated a new level of …

Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise

F Liu, Y Wen, D Zhang, X Jiang, X **ng… - Proceedings of the 2019 …, 2019 - dl.acm.org
Conventional attacks of insider employees and emerging APT are both major threats for the
organizational information system. Existing detections mainly concentrate on users' behavior …

When machine unlearning jeopardizes privacy

M Chen, Z Zhang, T Wang, M Backes… - Proceedings of the …, 2021 - dl.acm.org
The right to be forgotten states that a data owner has the right to erase their data from an
entity storing it. In the context of machine learning (ML), the right to be forgotten requires an …

{Updates-Leak}: Data set inference and reconstruction attacks in online learning

A Salem, A Bhattacharya, M Backes, M Fritz… - 29th USENIX security …, 2020 - usenix.org
Machine learning (ML) has progressed rapidly during the past decade and the major factor
that drives such development is the unprecedented large-scale data. As data generation is a …

Inference attacks against graph neural networks

Z Zhang, M Chen, M Backes, Y Shen… - 31st USENIX Security …, 2022 - usenix.org
Graph is an important data representation ubiquitously existing in the real world. However,
analyzing the graph data is computationally difficult due to its non-Euclidean nature. Graph …