Redactor: A Data-Centric and Individualized Defense Against Inference Attacks

被引:0
|
作者
Heo, Geon [1 ]
Whang, Steven Euijong [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Daejeon, South Korea
基金
新加坡国家研究基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information leakage is becoming a critical problem as various information becomes publicly available by mistake, and machine learning models train on that data to provide services. As a result, one's private information could easily be memorized by such trained models. Unfortunately, deleting information is out of the question as the data is already exposed to the Web or third-party platforms. Moreover, we cannot necessarily control the labeling process and the model trainings by other parties either. In this setting, we study the problem of targeted disinformation generation where the goal is to dilute the data and thus make a model safer and more robust against inference attacks on a specific target (e.g., a person's profile) by only inserting new data. Our method finds the closest points to the target in the input space that will be labeled as a different class. Since we cannot control the labeling process, we instead conservatively estimate the labels probabilistically by combining decision boundaries of multiple classifiers using data programming techniques. Our experiments show that a probabilistic decision boundary can be a good proxy for labelers, and that our approach is effective in defending against inference attacks and can scale to large data.
引用
收藏
页码:14874 / 14882
页数:9
相关论文
共 50 条
  • [1] SpectreGuard: An Efficient Data-centric Defense Mechanism against Spectre Attacks
    Fustos, Jacob
    Farshchi, Farzad
    Yun, Heechul
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [2] Preventive Inference Control in Data-centric Business Models
    Accorsi, Rafael
    Mueller, Guenter
    IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 28 - 33
  • [3] Data-Centric Edge Computing to Defend Power Grids Against IoT-Based Attacks
    Shrestha, Bibek
    Lin, Hui
    COMPUTER, 2020, 53 (05) : 35 - 43
  • [4] Output regeneration defense against membership inference attacks for protecting data privacy
    Ding, Yong
    Huang, Peixiong
    Liang, Hai
    Yuan, Fang
    Wang, Huiyong
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2023, : 61 - 79
  • [5] Defense Against Membership Inference Attacks on Imbalanced Dataset Using Generated Data
    Lu, Qiaoling
    Tian, Feng
    Ren, Jie
    Li, Mengdi
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 154 - 159
  • [6] Data-Centric AI
    Malerba, Donato
    Pasquadibisceglie, Vincenzo
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2024, 62 (06) : 1493 - 1502
  • [7] Provenance-Based Quality Assessment and Inference in Data-Centric Workflow Executions
    Caron, Clement
    Amann, Bernd
    Constantin, Camelia
    Giroux, Patrick
    Santanche, Andre
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2014 CONFERENCES, 2014, 8841 : 130 - 147
  • [8] Data-centric automated data mining
    Campos, MM
    Stengard, PJ
    Milenova, BL
    ICMLA 2005: FOURTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, PROCEEDINGS, 2005, : 97 - 104
  • [9] RDF Data-Centric Storage
    Levandoski, Justin J.
    Mokbel, Mohamed F.
    2009 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, VOLS 1 AND 2, 2009, : 911 - 918
  • [10] The Principles of Data-Centric AI
    Jarrahi, Mohammad Hossein
    Memariani, Ali
    Guha, Shion
    COMMUNICATIONS OF THE ACM, 2023, 66 (08) : 84 - 92