Log In Sign Up

Bayesian Framework for Gradient Leakage

by   Mislav Balunović, et al.

Federated learning is an established method for training machine learning models without sharing training data. However, recent work has shown that it cannot guarantee data privacy as shared gradients can still leak sensitive information. To formalize the problem of gradient leakage, we propose a theoretical framework that enables, for the first time, analysis of the Bayes optimal adversary phrased as an optimization problem. We demonstrate that existing leakage attacks can be seen as approximations of this optimal adversary with different assumptions on the probability distributions of the input data and gradients. Our experiments confirm the effectiveness of the Bayes optimal adversary when it has knowledge of the underlying distribution. Further, our experimental evaluation shows that several existing heuristic defenses are not effective against stronger attacks, especially early in the training process. Thus, our findings indicate that the construction of more effective defenses and their evaluation remains an open problem.


page 8

page 12

page 13


Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning

Federated Learning (FL) is pervasive in privacy-focused IoT environments...

Quantification of the Leakage in Federated Learning

With the growing emphasis on users' privacy, federated learning has beco...

User Label Leakage from Gradients in Federated Learning

Federated learning enables multiple users to build a joint model by shar...

Understanding Training-Data Leakage from Gradients in Neural Networks for Image Classification

Federated learning of deep learning models for supervised tasks, e.g. im...

TAG: Transformer Attack from Gradient

Although federated learning has increasingly gained attention in terms o...

Data Poisoning Attacks against Online Learning

We consider data poisoning attacks, a class of adversarial attacks on ma...

ActShare: Sensitive Data Sharing with Reliable Leaker Identification

Data sharing among multiple parties becomes increasingly common today, s...