Differential Privacy Defenses and Sampling Attacks for Membership Inference
暂无分享,去创建一个
Tribhuvanesh Orekondy | Mario Fritz | Shadi Rahimian | Mario Fritz | Tribhuvanesh Orekondy | Shadi Rahimian
[1] Nic Ford,et al. Adversarial Examples Are a Natural Consequence of Test Error in Noise , 2019, ICML.
[2] W. R. Simmons,et al. The Unrelated Question Randomized Response Model: Theoretical Framework , 1969 .
[3] S. P. Lloyd,et al. Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.
[4] Zhou Li,et al. Privacy-preserving genomic computation through program specialization , 2009, CCS.
[5] Yang Zhang,et al. Label-Leaks: Membership Inference Attack with Label , 2020, ArXiv.
[6] Daniel Bernau,et al. Monte Carlo and Reconstruction Membership Inference Attacks against Generative Models , 2019, Proc. Priv. Enhancing Technol..
[7] Somesh Jha,et al. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting , 2017, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[8] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[9] Vitaly Shmatikov,et al. Exploiting Unintended Feature Leakage in Collaborative Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[10] Nicholas Carlini,et al. Label-Only Membership Inference Attacks , 2020, ICML.
[11] Sara Bouchenak,et al. AP-Attack: A Novel User Re-identification Attack On Mobility Datasets , 2017, MobiQuitous.
[12] Bo Li,et al. Generative Model: Membership Attack, Generalization and Diversity , 2018, ArXiv.
[13] Emiliano De Cristofaro,et al. Knock Knock, Who's There? Membership Inference on Aggregate Location Data , 2017, NDSS.
[14] Chao Chen,et al. The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT , 2019, ArXiv.
[15] Michael Backes,et al. Membership Privacy in MicroRNA-based Studies , 2016, CCS.
[16] Prateek Mittal,et al. Privacy Risks of Securing Machine Learning Models against Adversarial Examples , 2019, CCS.
[17] Robert Laganière,et al. Membership Inference Attack against Differentially Private Deep Learning Model , 2018, Trans. Data Priv..
[18] David Evans,et al. Evaluating Differentially Private Machine Learning in Practice , 2019, USENIX Security Symposium.
[19] Thomas Steinke,et al. Robust Traceability from Trace Amounts , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.
[20] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[21] Amir Houmansadr,et al. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[22] Kai Chen,et al. Understanding Membership Inferences on Well-Generalized Learning Models , 2018, ArXiv.
[23] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[24] Haixu Tang,et al. Learning your identity and disease from research papers: information leaks in genome wide association study , 2009, CCS.
[25] Mario Fritz,et al. GAN-Leaks: A Taxonomy of Membership Inference Attacks against GANs , 2019, ArXiv.
[26] Kai Peng,et al. SocInf: Membership Inference Attacks on Social Media Health Data With Machine Learning , 2019, IEEE Transactions on Computational Social Systems.
[27] Yin Yang,et al. Functional Mechanism: Regression Analysis under Differential Privacy , 2012, Proc. VLDB Endow..
[28] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[29] Emiliano De Cristofaro,et al. LOGAN: Membership Inference Attacks Against Generative Models , 2017, Proc. Priv. Enhancing Technol..
[30] Y. Hoffman. Knock! Knock! Who's there? , 1995, Michigan health & hospitals.
[31] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[32] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[33] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[34] S. Nelson,et al. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.
[35] Vitaly Shmatikov,et al. Auditing Data Provenance in Text-Generation Models , 2018, KDD.
[36] Dan Suciu,et al. Relationship privacy: output perturbation for queries with joins , 2009, PODS.
[37] Michael Backes,et al. MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples , 2019, CCS.
[38] Pramod Viswanath,et al. Extremal Mechanisms for Local Differential Privacy , 2014, J. Mach. Learn. Res..
[39] Yin Yang,et al. Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy , 2016, CCS.
[40] Vitaly Shmatikov,et al. Machine Learning Models that Remember Too Much , 2017, CCS.
[41] Hung Dang,et al. Evading Classifiers by Morphing in the Dark , 2017, CCS.
[42] Mario Fritz,et al. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models , 2018, NDSS.
[43] Reza Shokri,et al. Machine Learning with Membership Privacy using Adversarial Regularization , 2018, CCS.
[44] Stefan Katzenbeisser,et al. Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering , 2017, Proc. Priv. Enhancing Technol..