Black-Box Based Limited Query Membership Inference Attack

被引:4
|
作者
Zhang, Yu [1 ]
Zhou, Huaping [1 ]
Wang, Pengyan [1 ]
Yang, Gaoming [1 ]
机构
[1] Anhui Univ Sci & Technol, Sch Comp Sci & Engn, Huainan 232001, Peoples R China
关键词
Data models; Training; Adaptation models; Training data; Predictive models; Generative adversarial networks; Machine learning; Membership inference attack; generative adversarial network; black-box attack; information leak;
D O I
10.1109/ACCESS.2022.3175824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional membership inference attacks usually require a large number of queries of the target model when training shadow models, and this task becomes extremely difficult when the number of queries is limited. Aiming at the problem of insufficient training data for shadow models due to the limited number of queries, we propose a membership inference attack method based on generative adversarial networks (GAN). First, we use generative adversarial networks to augment the samples obtained by a small number of queries to expand the training data of the model; Secondly, we use the improved CNN to obtain shadow models that have a higher degree of fitting on different target model structures; Finally, we evaluate the accuracy of the proposed algorithm on XgBoost, Logistic, and neural network models using public datasets MNIST and CIFAR10 in a black-box setting, and the results show that our model has an average attack accuracy of 62% and 83%, respectively. It can be seen that, compared with the existing research methods, our model can obtain better attack effects under the condition of significantly reducing the number of queries, which shows the feasibility of our proposed method in membership inference attacks.
引用
收藏
页码:55459 / 55468
页数:10
相关论文
共 50 条
  • [21] Black-Box Boundary Attack Based on Gradient Optimization
    Yang, Yuli
    Liu, Zishuo
    Lei, Zhen
    Wu, Shuhong
    Chen, Yongle
    [J]. ELECTRONICS, 2024, 13 (06)
  • [22] Efficient Query-based Black-box Attack against Cross-modal Hashing Retrieval
    Zhu, Lei
    Wang, Tianshi
    Li, Jingjing
    Zhang, Zheng
    Shen, Jialie
    Wang, Xinhua
    [J]. ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 41 (03)
  • [23] Evaluation of Query-Based Membership Inference Attack on the Medical Data
    Pedarla, Lakshmi Prasanna
    Zhang, Xinyue
    Zhao, Liang
    Khan, Hafiz
    [J]. PROCEEDINGS OF THE 2023 ACM SOUTHEAST CONFERENCE, ACMSE 2023, 2023, : 191 - 195
  • [24] Query-based Local Black-box Adversarial Attacks
    Shi, Jing
    Zhang, Xiaolin
    Xu, Enhui
    Wang, Yongping
    Zhang, Wenwen
    [J]. International Journal of Network Security, 2023, 25 (06) : 1048 - 1058
  • [25] MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
    Jia, Jinyuan
    Salem, Ahmed
    Backes, Michael
    Zhang, Yang
    Gong, Neil Zhenqiang
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 259 - 274
  • [26] GanNoise: Defending against black-box membership inference attacks by countering noise generation
    Liang, Jiaming
    Huang, Teng
    Luo, Zidan
    Li, Dan
    Li, Yunhao
    Ding, Ziyu
    [J]. 2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 32 - 40
  • [27] On the Convergence of Black-Box Variational Inference
    Kim, Kyurae
    Oh, Jisu
    Wu, Kaiwen
    Ma, Yi-An
    Gardner, Jacob R.
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 36 (NEURIPS 2023), 2023,
  • [28] Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
    Yan, Ziang
    Guo, Yiwen
    Zhang, Changshui
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 32 (NIPS 2019), 2019, 32
  • [29] Towards Query-efficient Black-box Adversarial Attack on Text Classification Models
    Yadollahi, Mohammad Mehdi
    Lashkari, Arash Habibi
    Ghorbani, Ali A.
    [J]. 2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [30] THE BLACK-BOX QUERY COMPLEXITY OF POLYNOMIAL SUMMATION
    Juma, Ali
    Kabanets, Valentine
    Rackoff, Charles
    Shpilka, Amir
    [J]. COMPUTATIONAL COMPLEXITY, 2009, 18 (01) : 59 - 79