Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models

被引:0
|
作者
Chen, Liuqiao [1 ]
Wang, Hu [2 ]
Zhao, Benjamin Zi Hao [3 ,4 ]
Xue, Minhui [2 ]
Qian, Haifeng [1 ]
机构
[1] East China Normal Univ, Shanghai, Peoples R China
[2] Univ Adelaide, Adelaide, SA, Australia
[3] Univ New South Wales, Sydney, NSW, Australia
[4] Data61 CSIRO, Sydney, NSW, Australia
基金
澳大利亚研究理事会;
关键词
Data poisoning; Deep learning privacy; Facial recognition; Multi-cloaks;
D O I
10.1007/978-3-030-90567-5_28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep Neural Networks have achieved unprecedented success in the field of face recognition such that any individual can crawl the data of others from the Internet without their explicit permission for the purpose of training high-precision face recognition models, creating a serious violation of privacy. Recently, a well-known system named Fawkes [37] (published in USENIX Security 2020) claimed this privacy threat can be neutralized by uploading cloaked user images instead of their original images. In this paper, we present ORIOLE, a system that combines the advantages of data poisoning attacks and evasion attacks, to thwart the protection offered by Fawkes, by training the attacker face recognition model with multi-cloaked images generated by ORIOLE. Consequently, the face recognition accuracy of the attack model is maintained and the weaknesses of Fawkes are revealed. Experimental results show that our proposed ORIOLE system is able to effectively interfere with the performance of the Fawkes system to achieve promising attacking results. Our ablation study highlights multiple principal factors that affect the performance of the ORIOLE system, including the DSSIM perturbation budget, the ratio of leaked clean user images, and the numbers of multi-cloaks for each uncloaked image. We also identify and discuss at length the vulnerabilities of Fawkes. We hope that the new methodology presented in this paper will inform the security community of a need to design more robust privacy-preserving deep learning models.
引用
收藏
页码:550 / 568
页数:19
相关论文
共 50 条
  • [1] Privacy attacks against deep learning models and their countermeasures
    Shafee, Ahmed
    Awaad, Tasneem A.
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 114
  • [2] Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
    Shan, Shawn
    Wenger, Emily
    Zhang, Jiayun
    Li, Huiying
    Zheng, Haitao
    Zhao, Ben Y.
    [J]. PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 1589 - 1604
  • [3] Empirical study of privacy inference attack against deep reinforcement learning models
    Zhou, Huaicheng
    Mo, Kanghua
    Huang, Teng
    Li, Yongjin
    [J]. CONNECTION SCIENCE, 2023, 35 (01)
  • [4] Data Privacy and Trustworthy Machine Learning
    Strobel, Martin
    Shokri, Reza
    [J]. IEEE SECURITY & PRIVACY, 2022, 20 (05) : 44 - 49
  • [5] Towards Trustworthy Deep Learning
    Weng, Tsui-Wei
    [J]. THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 20, 2024, : 22682 - 22682
  • [6] Trustworthy machine learning in the context of security and privacy
    Upreti, Ramesh
    Lind, Pedro G.
    Elmokashfi, Ahmed
    Yazidi, Anis
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 2287 - 2314
  • [7] CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning
    Javaheripi, Mojan
    Samragh, Mohammad
    Rouhani, Bita Darvish
    Javidi, Tara
    Koushanfar, Farinaz
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) : 736 - 752
  • [8] DeepCog: A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework in Industrial Policing
    Schiliro, Francesco
    Moustafa, Nour
    Razzak, Imran
    Beheshti, Amin
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (07) : 7485 - 7493
  • [9] Toward Trustworthy Deep Learning in Security
    Go, Wooyoung
    Lee, Daewoo
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2219 - 2221
  • [10] Trustworthy Graph Learning: Reliability, Explainability, and Privacy Protection
    Wu, Bingzhe
    Bian, Yatao
    Zhang, Hengtong
    Li, Jintang
    Yu, Junchi
    Chen, Liang
    Chen, Chaochao
    Huang, Junzhou
    [J]. PROCEEDINGS OF THE 28TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2022, 2022, : 4838 - 4839