Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks

被引:0
|
作者
Struppek, Lukas [1 ]
Hintersdorf, Dominik [1 ]
Correia, Antonio De Almeida [1 ]
Adler, Antonia [2 ]
Kersting, Kristian [1 ,3 ,4 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, Darmstadt, Germany
[2] Univ Bundeswehr Munchen, Munich, Germany
[3] Tech Univ Darmstadt, Ctr Cognit Sci, Darmstadt, Germany
[4] Hessian Ctr AI Hessian AI, Darmstadt, Germany
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Model inversion attacks (MIAs) aim to create synthetic images that reflect the class-wise characteristics from a target classifier's private training data by exploiting the model's learned knowledge. Previous research has developed generative MIAs that use generative adversarial networks (GANs) as image priors tailored to a specific target model. This makes the attacks time- and resource-consuming, inflexible, and susceptible to distributional shifts between datasets. To overcome these drawbacks, we present Plug & Play Attacks, which relax the dependency between the target model and image prior, and enable the use of a single GAN to attack a wide range of targets, requiring only minor adjustments to the attack. Moreover, we show that powerful MIAs are possible even with publicly available pre-trained GANs and under strong distributional shifts, for which previous approaches fail to produce meaningful results. Our extensive evaluation confirms the improved robustness and flexibility of Plug & Play Attacks and their ability to create high-quality images revealing sensitive class characteristics.
引用
收藏
页数:24
相关论文
共 50 条
  • [41] TOWARDS MODEL QUANTIZATION ON THE RESILIENCE AGAINST MEMBERSHIP INFERENCE ATTACKS
    Kowalski, Charles
    Famili, Azadeh
    Lao, Yingjie
    2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, : 3646 - 3650
  • [42] Blue versus Red: Towards a Model of Distributed Security Attacks
    Fultz, Neal
    Grossklags, Jens
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 167 - 183
  • [43] AutoMA: Towards Automatic Model Augmentation for Transferable Adversarial Attacks
    Yuan, Haojie
    Chu, Qi
    Zhu, Feng
    Zhao, Rui
    Liu, Bin
    Yu, Nenghai
    IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 203 - 213
  • [44] Exposing Model Theft: A Robust and Transferable Watermark for Thwarting Model Extraction Attacks
    Tang, Ruixiang
    Jin, Hongye
    Du, Mengnan
    Wigington, Curtis
    Jain, Rajiv
    Hu, Xia
    PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 4315 - 4319
  • [45] Towards Plug-and-Play Microgrids
    Vorobev, Petr
    Huang, Po-Hsu
    Al Hosani, Mohamed
    Kirtley, James L.
    Turitsyn, Konstantin
    IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 4063 - 4068
  • [46] Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks
    Mao, Yunlong
    Yuan, Xinyu
    Zhao, Xinyang
    Zhong, Sheng
    COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 : 476 - 496
  • [47] Towards a plug and play architecture for telecommunications
    Aagesen, FA
    Helvik, BE
    Wuwongse, V
    Meling, H
    Bræk, R
    Johansen, U
    INTELLIGENCE IN NETWORKS, 2000, 30 : 321 - 334
  • [48] Flexible traitor tracing for anonymous attacks
    Jin, HX
    Lotspiech, J
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 269 - 270
  • [49] Efficient and Robust Classification for Sparse Attacks
    Beliaev M.
    Delgosha P.
    Hassani H.
    Pedarsani R.
    IEEE Journal on Selected Areas in Information Theory, 2024, 5 : 261 - 272
  • [50] Robust Learning for Data Poisoning Attacks
    Wang, Yunjuan
    Mianjy, Poorya
    Arora, Raman
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 139, 2021, 139 : 7872 - 7881