User-Level Membership Inference Attack against Metric Embedding Learning

03/04/2022
by   Guoyao Li, et al.
0

Membership inference (MI) determines if a sample was part of a victim model training set. Recent development of MI attacks focus on record-level membership inference which limits their application in many real-world scenarios. For example, in the person re-identification task, the attacker (or investigator) is interested in determining if a user's images have been used during training or not. However, the exact training images might not be accessible to the attacker. In this paper, we develop a user-level MI attack where the goal is to find if any sample from the target user has been used during training even when no exact training sample is available to the attacker. We focus on metric embedding learning due to its dominance in person re-identification, where user-level MI attack is more sensible. We conduct an extensive evaluation on several datasets and show that our approach achieves high accuracy on user-level MI task.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/29/2022

Similarity Distribution based Membership Inference Attack on Person Re-identification

While person Re-identification (Re-ID) has progressed rapidly due to its...
research
06/27/2019

Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference

Membership inference (MI) attacks exploit a learned model's lack of gene...
research
08/07/2021

Membership Inference Attacks on Lottery Ticket Networks

The vulnerability of the Lottery Ticket Hypothesis has not been studied ...
research
11/20/2022

Invisible Backdoor Attack with Dynamic Triggers against Person Re-identification

In recent years, person Re-identification (ReID) has rapidly progressed ...
research
05/30/2022

White-box Membership Attack Against Machine Learning Based Retinopathy Classification

The advances in machine learning (ML) have greatly improved AI-based dia...
research
12/14/2020

Localization Attack by Precoder Feedback Overhearing in 5G Networks and Countermeasures

In fifth-generation (5G) cellular networks, users feed back to the base ...
research
12/30/2020

Explainability Matters: Backdoor Attacks on Medical Imaging

Deep neural networks have been shown to be vulnerable to backdoor attack...

Please sign up or login with your details

Forgot password? Click here to reset