Skip to main content

Showing 1–48 of 48 results for author: Jagielski, M

.
  1. arXiv:2407.00106  [pdf, other

    cs.LG cs.AI cs.CL cs.CR

    UnUnlearning: Unlearning is not sufficient for content regulation in advanced generative AI

    Authors: Ilia Shumailov, Jamie Hayes, Eleni Triantafillou, Guillermo Ortiz-Jimenez, Nicolas Papernot, Matthew Jagielski, Itay Yona, Heidi Howard, Eugene Bagdasaryan

    Abstract: Exact unlearning was first introduced as a privacy mechanism that allowed a user to retract their data from machine learning models on request. Shortly after, inexact schemes were proposed to mitigate the impractical costs associated with exact unlearning. More recently unlearning is often discussed as an approach for removal of impermissible knowledge i.e. knowledge that the model should not poss… ▽ More

    Submitted 27 June, 2024; originally announced July 2024.

  2. arXiv:2406.08039  [pdf, other

    cs.LG cs.CR

    Beyond the Mean: Differentially Private Prototypes for Private Transfer Learning

    Authors: Dariush Wahdany, Matthew Jagielski, Adam Dziedzic, Franziska Boenisch

    Abstract: Machine learning (ML) models have been shown to leak private information from their training datasets. Differential Privacy (DP), typically implemented through the differential private stochastic gradient descent algorithm (DP-SGD), has become the standard solution to bound leakage from the models. Despite recent improvements, DP-SGD-based approaches for private learning still usually struggle in… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: Submitted to NeurIPS 2024

    MSC Class: 68T01

  3. arXiv:2405.20485  [pdf, other

    cs.CR cs.CL cs.LG

    Phantom: General Trigger Attacks on Retrieval Augmented Language Generation

    Authors: Harsh Chaudhari, Giorgio Severi, John Abascal, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, Alina Oprea

    Abstract: Retrieval Augmented Generation (RAG) expands the capabilities of modern large language models (LLMs) in chatbot applications, enabling developers to adapt and personalize the LLM output without expensive training or fine-tuning. RAG systems use an external knowledge database to retrieve the most relevant documents for a given query, providing this context to the LLM generator. While RAG achieves i… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  4. arXiv:2404.02052  [pdf, other

    cs.LG

    Noise Masking Attacks and Defenses for Pretrained Speech Models

    Authors: Matthew Jagielski, Om Thakkar, Lun Wang

    Abstract: Speech models are often trained on sensitive data in order to improve model performance, leading to potential privacy leakage. Our work considers noise masking attacks, introduced by Amid et al. 2022, which attack automatic speech recognition (ASR) models by requesting a transcript of an utterance which is partially replaced with noise. They show that when a record has been seen at training time,… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: accepted to ICASSP 2024

  5. arXiv:2403.06634  [pdf, other

    cs.CR

    Stealing Part of a Production Language Model

    Authors: Nicholas Carlini, Daniel Paleka, Krishnamurthy Dj Dvijotham, Thomas Steinke, Jonathan Hayase, A. Feder Cooper, Katherine Lee, Matthew Jagielski, Milad Nasr, Arthur Conmy, Eric Wallace, David Rolnick, Florian Tramèr

    Abstract: We introduce the first model-stealing attack that extracts precise, nontrivial information from black-box production language models like OpenAI's ChatGPT or Google's PaLM-2. Specifically, our attack recovers the embedding projection layer (up to symmetries) of a transformer model, given typical API access. For under \… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  6. arXiv:2402.09403  [pdf, other

    cs.CR

    Auditing Private Prediction

    Authors: Karan Chadha, Matthew Jagielski, Nicolas Papernot, Christopher Choquette-Choo, Milad Nasr

    Abstract: Differential privacy (DP) offers a theoretical upper bound on the potential privacy leakage of analgorithm, while empirical auditing establishes a practical lower bound. Auditing techniques exist forDP training algorithms. However machine learning can also be made private at inference. We propose thefirst framework for auditing private prediction where we instantiate adversaries with varying poiso… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  7. arXiv:2311.17035  [pdf, other

    cs.LG cs.CL cs.CR

    Scalable Extraction of Training Data from (Production) Language Models

    Authors: Milad Nasr, Nicholas Carlini, Jonathan Hayase, Matthew Jagielski, A. Feder Cooper, Daphne Ippolito, Christopher A. Choquette-Choo, Eric Wallace, Florian Tramèr, Katherine Lee

    Abstract: This paper studies extractable memorization: training data that an adversary can efficiently extract by querying a machine learning model without prior knowledge of the training dataset. We show an adversary can extract gigabytes of training data from open-source language models like Pythia or GPT-Neo, semi-open models like LLaMA or Falcon, and closed models like ChatGPT. Existing techniques from… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

  8. arXiv:2309.05610  [pdf, other

    cs.CR cs.LG

    Privacy Side Channels in Machine Learning Systems

    Authors: Edoardo Debenedetti, Giorgio Severi, Nicholas Carlini, Christopher A. Choquette-Choo, Matthew Jagielski, Milad Nasr, Eric Wallace, Florian Tramèr

    Abstract: Most current approaches for protecting privacy in machine learning (ML) assume that models exist in a vacuum, when in reality, ML models are part of larger systems that include components for training data filtering, output monitoring, and more. In this work, we introduce privacy side channels: attacks that exploit these system-level components to extract private information at far higher rates th… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

  9. arXiv:2307.14692  [pdf, other

    cs.CR

    Backdoor Attacks for In-Context Learning with Language Models

    Authors: Nikhil Kandpal, Matthew Jagielski, Florian Tramèr, Nicholas Carlini

    Abstract: Because state-of-the-art language models are expensive to train, most practitioners must make use of one of the few publicly available language models or language model APIs. This consolidation of trust increases the potency of backdoor attacks, where an adversary tampers with a machine learning model in order to make it perform some malicious behavior on inputs that contain a predefined backdoor… ▽ More

    Submitted 27 July, 2023; originally announced July 2023.

    Comments: AdvML Frontiers Workshop 2023

  10. arXiv:2306.15447  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    Are aligned neural networks adversarially aligned?

    Authors: Nicholas Carlini, Milad Nasr, Christopher A. Choquette-Choo, Matthew Jagielski, Irena Gao, Anas Awadalla, Pang Wei Koh, Daphne Ippolito, Katherine Lee, Florian Tramer, Ludwig Schmidt

    Abstract: Large language models are now tuned to align with the goals of their creators, namely to be "helpful and harmless." These models should respond helpfully to user questions, but refuse to answer requests that could cause harm. However, adversarial users can construct inputs which circumvent attempts at alignment. In this work, we study adversarial alignment, and ask to what extent these models rema… ▽ More

    Submitted 6 May, 2024; v1 submitted 26 June, 2023; originally announced June 2023.

  11. arXiv:2306.00133  [pdf, ps, other

    cs.CR cs.LG

    A Note On Interpreting Canary Exposure

    Authors: Matthew Jagielski

    Abstract: Canary exposure, introduced in Carlini et al. is frequently used to empirically evaluate, or audit, the privacy of machine learning model training. The goal of this note is to provide some intuition on how to interpret canary exposure, including by relating it to membership inference attacks and differential privacy.

    Submitted 2 June, 2023; v1 submitted 31 May, 2023; originally announced June 2023.

    Comments: short note, edited to add a sentence on independence of canary losses, including adding Pillutla et al

  12. arXiv:2305.10403  [pdf, other

    cs.CL cs.AI

    PaLM 2 Technical Report

    Authors: Rohan Anil, Andrew M. Dai, Orhan Firat, Melvin Johnson, Dmitry Lepikhin, Alexandre Passos, Siamak Shakeri, Emanuel Taropa, Paige Bailey, Zhifeng Chen, Eric Chu, Jonathan H. Clark, Laurent El Shafey, Yan** Huang, Kathy Meier-Hellstern, Gaurav Mishra, Erica Moreira, Mark Omernick, Kevin Robinson, Sebastian Ruder, Yi Tay, Kefan Xiao, Yuanzhong Xu, Yu**g Zhang, Gustavo Hernandez Abrego , et al. (103 additional authors not shown)

    Abstract: We introduce PaLM 2, a new state-of-the-art language model that has better multilingual and reasoning capabilities and is more compute-efficient than its predecessor PaLM. PaLM 2 is a Transformer-based model trained using a mixture of objectives. Through extensive evaluations on English and multilingual language, and reasoning tasks, we demonstrate that PaLM 2 has significantly improved quality on… ▽ More

    Submitted 13 September, 2023; v1 submitted 17 May, 2023; originally announced May 2023.

  13. arXiv:2305.08846  [pdf, other

    cs.LG cs.CR cs.DS

    Privacy Auditing with One (1) Training Run

    Authors: Thomas Steinke, Milad Nasr, Matthew Jagielski

    Abstract: We propose a scheme for auditing differentially private machine learning systems with a single training run. This exploits the parallelism of being able to add or remove multiple training examples independently. We analyze this using the connection between differential privacy and statistical generalization, which avoids the cost of group privacy. Our auditing scheme requires minimal assumptions a… ▽ More

    Submitted 15 May, 2023; originally announced May 2023.

  14. arXiv:2305.05973  [pdf, other

    cs.CL cs.CR cs.IR

    Synthetic Query Generation for Privacy-Preserving Deep Retrieval Systems using Differentially Private Language Models

    Authors: Aldo Gael Carranza, Rezsa Farahani, Natalia Ponomareva, Alex Kurakin, Matthew Jagielski, Milad Nasr

    Abstract: We address the challenge of ensuring differential privacy (DP) guarantees in training deep retrieval systems. Training these systems often involves the use of contrastive-style losses, which are typically non-per-example decomposable, making them difficult to directly DP-train with since common techniques require per-example gradients. To address this issue, we propose an approach that prioritizes… ▽ More

    Submitted 23 May, 2024; v1 submitted 10 May, 2023; originally announced May 2023.

    Comments: Accepted to NAACL 2024

  15. arXiv:2304.06929  [pdf

    cs.CR

    Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment

    Authors: Rachel Cummings, Damien Desfontaines, David Evans, Roxana Geambasu, Yangsibo Huang, Matthew Jagielski, Peter Kairouz, Gautam Kamath, Sewoong Oh, Olga Ohrimenko, Nicolas Papernot, Ryan Rogers, Milan Shen, Shuang Song, Weijie Su, Andreas Terzis, Abhradeep Thakurta, Sergei Vassilvitskii, Yu-Xiang Wang, Li Xiong, Sergey Yekhanin, Da Yu, Huanyu Zhang, Wanrong Zhang

    Abstract: In this article, we present a detailed review of current practices and state-of-the-art methodologies in the field of differential privacy (DP), with a focus of advancing DP's deployment in real-world applications. Key points and high-level contents of the article were originated from the discussions from "Differential Privacy (DP): Challenges Towards the Next Frontier," a workshop held in July 20… ▽ More

    Submitted 12 March, 2024; v1 submitted 14 April, 2023; originally announced April 2023.

  16. arXiv:2303.03446  [pdf, other

    cs.CR cs.LG

    Students Parrot Their Teachers: Membership Inference on Model Distillation

    Authors: Matthew Jagielski, Milad Nasr, Christopher Choquette-Choo, Katherine Lee, Nicholas Carlini

    Abstract: Model distillation is frequently proposed as a technique to reduce the privacy leakage of machine learning. These empirical privacy defenses rely on the intuition that distilled ``student'' models protect the privacy of training data, as they only interact with this data indirectly through a ``teacher'' model. In this work, we design membership inference attacks to systematically study the privacy… ▽ More

    Submitted 6 March, 2023; originally announced March 2023.

    Comments: 16 pages, 12 figures

  17. arXiv:2302.13464  [pdf, other

    cs.LG cs.CR

    Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators

    Authors: Keane Lucas, Matthew Jagielski, Florian Tramèr, Lujo Bauer, Nicholas Carlini

    Abstract: It is becoming increasingly imperative to design robust ML defenses. However, recent work has found that many defenses that initially resist state-of-the-art attacks can be broken by an adaptive adversary. In this work we take steps to simplify the design of defenses and argue that white-box defenses should eschew randomness when possible. We begin by illustrating a new issue with the deployment o… ▽ More

    Submitted 26 February, 2023; originally announced February 2023.

  18. arXiv:2302.10149  [pdf, other

    cs.CR cs.LG

    Poisoning Web-Scale Training Datasets is Practical

    Authors: Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr

    Abstract: Deep learning models are often trained on distributed, web-scale datasets crawled from the internet. In this paper, we introduce two new dataset poisoning attacks that intentionally introduce malicious examples to a model's performance. Our attacks are immediately practical and could, today, poison 10 popular datasets. Our first attack, split-view poisoning, exploits the mutable nature of internet… ▽ More

    Submitted 6 May, 2024; v1 submitted 20 February, 2023; originally announced February 2023.

  19. arXiv:2302.07956  [pdf, other

    cs.LG cs.CR

    Tight Auditing of Differentially Private Machine Learning

    Authors: Milad Nasr, Jamie Hayes, Thomas Steinke, Borja Balle, Florian Tramèr, Matthew Jagielski, Nicholas Carlini, Andreas Terzis

    Abstract: Auditing mechanisms for differential privacy use probabilistic means to empirically estimate the privacy level of an algorithm. For private machine learning, existing auditing mechanisms are tight: the empirical privacy estimate (nearly) matches the algorithm's provable privacy guarantee. But these auditing techniques suffer from two limitations. First, they only give tight estimates under implaus… ▽ More

    Submitted 15 February, 2023; originally announced February 2023.

  20. arXiv:2301.13188  [pdf, other

    cs.CR cs.CV cs.LG

    Extracting Training Data from Diffusion Models

    Authors: Nicholas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tramèr, Borja Balle, Daphne Ippolito, Eric Wallace

    Abstract: Image diffusion models such as DALL-E 2, Imagen, and Stable Diffusion have attracted significant attention due to their ability to generate high-quality synthetic images. In this work, we show that diffusion models memorize individual images from their training data and emit them at generation time. With a generate-and-filter pipeline, we extract over a thousand training examples from state-of-the… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

  21. arXiv:2210.17546  [pdf, other

    cs.LG cs.CL

    Preventing Verbatim Memorization in Language Models Gives a False Sense of Privacy

    Authors: Daphne Ippolito, Florian Tramèr, Milad Nasr, Chiyuan Zhang, Matthew Jagielski, Katherine Lee, Christopher A. Choquette-Choo, Nicholas Carlini

    Abstract: Studying data memorization in neural language models helps us understand the risks (e.g., to privacy or copyright) associated with models regurgitating training data and aids in the development of countermeasures. Many prior works -- and some recently deployed defenses -- focus on "verbatim memorization", defined as a model generation that exactly matches a substring from the training set. We argu… ▽ More

    Submitted 11 September, 2023; v1 submitted 31 October, 2022; originally announced October 2022.

  22. arXiv:2208.12911  [pdf, other

    cs.CR cs.LG cs.NI

    Network-Level Adversaries in Federated Learning

    Authors: Giorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, Cristina Nita-Rotaru

    Abstract: Federated learning is a popular strategy for training models on distributed, sensitive data, while preserving data privacy. Prior work identified a range of security threats on federated learning protocols that poison the data or the model. However, federated learning is a networked system where the communication between clients and server plays a critical role for the learning task performance. W… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

    Comments: 12 pages. Appearing at IEEE CNS 2022

  23. arXiv:2208.12348  [pdf, other

    cs.LG cs.CR

    SNAP: Efficient Extraction of Private Properties with Poisoning

    Authors: Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman

    Abstract: Property inference attacks allow an adversary to extract global properties of the training dataset from a machine learning model. Such attacks have privacy implications for data owners sharing their datasets to train machine learning models. Several existing approaches for property inference attacks against deep neural networks have been proposed, but they all rely on the attacker training a large… ▽ More

    Submitted 21 June, 2023; v1 submitted 25 August, 2022; originally announced August 2022.

    Comments: 28 pages, 16 figures

  24. arXiv:2207.00099  [pdf, other

    cs.LG

    Measuring Forgetting of Memorized Training Examples

    Authors: Matthew Jagielski, Om Thakkar, Florian Tramèr, Daphne Ippolito, Katherine Lee, Nicholas Carlini, Eric Wallace, Shuang Song, Abhradeep Thakurta, Nicolas Papernot, Chiyuan Zhang

    Abstract: Machine learning models exhibit two seemingly contradictory phenomena: training data memorization, and various forms of forgetting. In memorization, models overfit specific training examples and become susceptible to privacy attacks. In forgetting, examples which appeared early in training are forgotten by the end. In this work, we connect these phenomena. We propose a technique to measure to what… ▽ More

    Submitted 9 May, 2023; v1 submitted 30 June, 2022; originally announced July 2022.

    Comments: Appeared at ICLR '23, 22 pages, 12 figures

  25. arXiv:2206.10469  [pdf, other

    cs.LG cs.CR

    The Privacy Onion Effect: Memorization is Relative

    Authors: Nicholas Carlini, Matthew Jagielski, Chiyuan Zhang, Nicolas Papernot, Andreas Terzis, Florian Tramer

    Abstract: Machine learning models trained on private datasets have been shown to leak their private data. While recent work has found that the average data point is rarely leaked, the outlier samples are frequently subject to memorization and, consequently, privacy leakage. We demonstrate and analyse an Onion Effect of memorization: removing the "layer" of outlier points that are most vulnerable to a privac… ▽ More

    Submitted 22 June, 2022; v1 submitted 21 June, 2022; originally announced June 2022.

  26. arXiv:2205.09986  [pdf, other

    cs.CR cs.LG

    SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning

    Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea

    Abstract: Secure multiparty computation (MPC) has been proposed to allow multiple mutually distrustful data owners to jointly train machine learning (ML) models on their combined data. However, by design, MPC protocols faithfully compute the training functionality, which the adversarial ML community has shown to leak private information and can be tampered with in poisoning attacks. In this work, we argue t… ▽ More

    Submitted 8 September, 2022; v1 submitted 20 May, 2022; originally announced May 2022.

  27. arXiv:2205.06369  [pdf, other

    cs.LG cs.CR

    How to Combine Membership-Inference Attacks on Multiple Updated Models

    Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu

    Abstract: A large body of research has shown that machine learning models are vulnerable to membership inference (MI) attacks that violate the privacy of the participants in the training data. Most MI research focuses on the case of a single standalone model, while production machine-learning platforms often update models over time, on data that often shifts in distribution, giving the attacker more informa… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Comments: 31 pages, 9 figures

  28. Subverting Fair Image Search with Generative Adversarial Perturbations

    Authors: Avijit Ghosh, Matthew Jagielski, Christo Wilson

    Abstract: In this work we explore the intersection fairness and robustness in the context of ranking: when a ranking model has been calibrated to achieve some definition of fairness, is it possible for an external adversary to make the ranking model behave unfairly without having access to the model or training data? To investigate this question, we present a case study in which we develop and then attack a… ▽ More

    Submitted 6 May, 2022; v1 submitted 4 May, 2022; originally announced May 2022.

    Comments: Accepted as a full paper at the 2022 ACM Conference on Fairness, Accountability, and Transparency (FAccT 22)

  29. arXiv:2204.00032  [pdf, other

    cs.CR cs.LG stat.ML

    Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets

    Authors: Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini

    Abstract: We introduce a new class of attacks on machine learning models. We show that an adversary who can poison a training dataset can cause models trained on this dataset to leak significant private details of training points belonging to other parties. Our active inference attacks connect two independent lines of work targeting the integrity and privacy of machine learning training data. Our attacks… ▽ More

    Submitted 6 October, 2022; v1 submitted 31 March, 2022; originally announced April 2022.

    Comments: ACM CCS 2022

  30. arXiv:2202.12219  [pdf, other

    cs.LG

    Debugging Differential Privacy: A Case Study for Privacy Auditing

    Authors: Florian Tramer, Andreas Terzis, Thomas Steinke, Shuang Song, Matthew Jagielski, Nicholas Carlini

    Abstract: Differential Privacy can provide provable privacy guarantees for training data in machine learning. However, the presence of proofs does not preclude the presence of errors. Inspired by recent advances in auditing which have been used for estimating lower bounds on differentially private algorithms, here we show that auditing can also be used to find flaws in (purportedly) differentially private s… ▽ More

    Submitted 28 March, 2022; v1 submitted 24 February, 2022; originally announced February 2022.

  31. arXiv:2202.07646  [pdf, other

    cs.LG cs.CL

    Quantifying Memorization Across Neural Language Models

    Authors: Nicholas Carlini, Daphne Ippolito, Matthew Jagielski, Katherine Lee, Florian Tramer, Chiyuan Zhang

    Abstract: Large language models (LMs) have been shown to memorize parts of their training data, and when prompted appropriately, they will emit the memorized training data verbatim. This is undesirable because memorization violates privacy (exposing user data), degrades utility (repeated easy-to-memorize text is often low quality), and hurts fairness (some texts are memorized over others). We describe thr… ▽ More

    Submitted 6 March, 2023; v1 submitted 15 February, 2022; originally announced February 2022.

  32. arXiv:2112.12938  [pdf, other

    cs.CL cs.AI cs.LG

    Counterfactual Memorization in Neural Language Models

    Authors: Chiyuan Zhang, Daphne Ippolito, Katherine Lee, Matthew Jagielski, Florian Tramèr, Nicholas Carlini

    Abstract: Modern neural language models that are widely used in various NLP tasks risk memorizing sensitive information from their training data. Understanding this memorization is important in real world applications and also from a learning-theoretical perspective. An open question in previous studies of language model memorization is how to filter out "common" memorization. In fact, most memorization cri… ▽ More

    Submitted 13 October, 2023; v1 submitted 23 December, 2021; originally announced December 2021.

    Comments: NeurIPS 2023; 42 pages, 33 figures

  33. arXiv:2012.07805  [pdf, other

    cs.CR cs.CL cs.LG

    Extracting Training Data from Large Language Models

    Authors: Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, Alina Oprea, Colin Raffel

    Abstract: It has become common to publish large (billion parameter) language models that have been trained on private datasets. This paper demonstrates that in such settings, an adversary can perform a training data extraction attack to recover individual training examples by querying the language model. We demonstrate our attack on GPT-2, a language model trained on scrapes of the public Internet, and ar… ▽ More

    Submitted 15 June, 2021; v1 submitted 14 December, 2020; originally announced December 2020.

  34. arXiv:2006.14026  [pdf, other

    cs.LG cs.CR stat.ML

    Subpopulation Data Poisoning Attacks

    Authors: Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea

    Abstract: Machine learning systems are deployed in critical settings, but they might fail in unexpected ways, impacting the accuracy of their predictions. Poisoning attacks against machine learning induce adversarial modification of data used by a machine learning algorithm to selectively change its output when it is deployed. In this work, we introduce a novel data poisoning attack called a \emph{subpopula… ▽ More

    Submitted 12 May, 2021; v1 submitted 24 June, 2020; originally announced June 2020.

    Comments: May12 update: add sever + backdoor defenses, comparison to witches' brew attack, better comparison to related work, transferability of representations for cmatch

  35. arXiv:2006.07709  [pdf, other

    cs.CR cs.LG

    Auditing Differentially Private Machine Learning: How Private is Private SGD?

    Authors: Matthew Jagielski, Jonathan Ullman, Alina Oprea

    Abstract: We investigate whether Differentially Private SGD offers better privacy in practice than what is guaranteed by its state-of-the-art analysis. We do so via novel data poisoning attacks, which we show correspond to realistic privacy attacks. While previous work (Ma et al., arXiv 2019) proposed this connection between differential privacy and data poisoning as a defense against data poisoning, our us… ▽ More

    Submitted 13 June, 2020; originally announced June 2020.

  36. arXiv:2003.04884  [pdf, other

    cs.LG cs.CR

    Cryptanalytic Extraction of Neural Network Models

    Authors: Nicholas Carlini, Matthew Jagielski, Ilya Mironov

    Abstract: We argue that the machine learning problem of model extraction is actually a cryptanalytic problem in disguise, and should be studied as such. Given oracle access to a neural network, we introduce a differential attack that can efficiently steal the parameters of the remote model up to floating point precision. Our attack relies on the fact that ReLU neural networks are piecewise linear functions,… ▽ More

    Submitted 22 July, 2020; v1 submitted 10 March, 2020; originally announced March 2020.

  37. arXiv:1909.01838  [pdf, other

    cs.LG cs.CR stat.ML

    High Accuracy and High Fidelity Extraction of Neural Networks

    Authors: Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot

    Abstract: In a model extraction attack, an adversary steals a copy of a remotely deployed machine learning model, given oracle prediction access. We taxonomize model extraction attacks around two objectives: *accuracy*, i.e., performing well on the underlying learning task, and *fidelity*, i.e., matching the predictions of the remote victim classifier on any input. To extract a high-accuracy model, we dev… ▽ More

    Submitted 3 March, 2020; v1 submitted 3 September, 2019; originally announced September 2019.

    Comments: USENIX Security 2020, 18 pages, 6 figures

  38. arXiv:1812.02696  [pdf, other

    cs.LG cs.DS cs.GT stat.ML

    Differentially Private Fair Learning

    Authors: Matthew Jagielski, Michael Kearns, Jieming Mao, Alina Oprea, Aaron Roth, Saeed Sharifi-Malvajerdi, Jonathan Ullman

    Abstract: Motivated by settings in which predictive models may be required to be non-discriminatory with respect to certain attributes (such as race), but even collecting the sensitive attribute may be forbidden or restricted, we initiate the study of fair learning under the constraint of differential privacy. We design two learning algorithms that simultaneously promise differential privacy and equalized o… ▽ More

    Submitted 31 May, 2019; v1 submitted 6 December, 2018; originally announced December 2018.

  39. arXiv:1809.02861  [pdf, other

    cs.LG cs.CR stat.ML

    Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks

    Authors: Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli

    Abstract: Transferability captures the ability of an attack against a machine-learning model to be effective against a different, potentially unknown, model. Empirical evidence for transferability has been shown in previous work, but the underlying reasons why an attack transfers or not are not yet well understood. In this paper, we present a comprehensive analysis aimed to investigate the transferability o… ▽ More

    Submitted 13 June, 2019; v1 submitted 8 September, 2018; originally announced September 2018.

    MSC Class: 68T10; 68T45

  40. arXiv:1804.00308  [pdf, other

    cs.CR cs.GT cs.LG

    Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning

    Authors: Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li

    Abstract: As machine learning becomes widely used for automated decisions, attackers have strong incentives to manipulate the results and models generated by machine learning algorithms. In this paper, we perform the first systematic study of poisoning attacks and their countermeasures for linear regression models. In poisoning attacks, attackers deliberately influence the training data to manipulate the re… ▽ More

    Submitted 28 September, 2021; v1 submitted 1 April, 2018; originally announced April 2018.

    Comments: Preprint of the work accepted for publication at the 39th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 21-23, 2018; Sept 28 '21 update: add citation to trimmed losses

  41. arXiv:1610.08921  [pdf, other

    q-fin.ST physics.soc-ph

    Theory of earthquakes interevent times applied to financial markets

    Authors: Maciej Jagielski, Ryszard Kutner, Didier Sornette

    Abstract: We analyze the probability density function (PDF) of waiting times between financial loss exceedances. The empirical PDFs are fitted with the self-excited Hawkes conditional Poisson process with a long power law memory kernel. The Hawkes process is the simplest extension of the Poisson process that takes into account how past events influence the occurrence of future events. By analyzing the empir… ▽ More

    Submitted 28 October, 2016; v1 submitted 27 October, 2016; originally announced October 2016.

  42. arXiv:1610.08918  [pdf, ps, other

    q-fin.GN physics.soc-ph

    Income and wealth distribution of the richest Norwegian individuals: An inequality analysis

    Authors: Maciej Jagielski, Kordian Czyżewski, Ryszard Kutner, H. Eugene Stanley

    Abstract: Using the empirical data from the Norwegian tax office, we analyse the wealth and income of the richest individuals in Norway during the period 2010--2013. We find that both annual income and wealth level of the richest individuals are describable using the Pareto law. We find that the robust mean Pareto exponent over the four-year period to be $\approx 2.3$ for income and $\approx 1.5$ for wealth… ▽ More

    Submitted 27 October, 2016; originally announced October 2016.

  43. Universality of market superstatistics

    Authors: Mateusz Denys, Maciej Jagielski, Tomasz Gubiec, Ryszard Kutner, H. Eugene Stanley

    Abstract: We use a continuous-time random walk (CTRW) to model market fluctuation data from times when traders experience excessive losses or excessive profits. We analytically derive "superstatistics" that accurately model empirical market activity data (supplied by Bogachev, Ludescher, Tsallis, and Bunde)that exhibit transition thresholds. We measure the interevent times between excessive losses and exces… ▽ More

    Submitted 10 September, 2015; originally announced September 2015.

    Journal ref: Phys. Rev. E 94, 042305 (2016)

  44. arXiv:1411.1560  [pdf, ps, other

    q-fin.GN physics.soc-ph

    Income Distribution in the European Union Versus in the United States

    Authors: Maciej Jagielski, Rafał Duczmal, Ryszard Kutner

    Abstract: We prove that the refined approach -- our extension of the Yakovenko et al. formalism -- is universal in the sense that it describes well both household incomes in the European Union and the individual incomes in the United States for social classes of any income. This formalism allowed the study of the impact of the recent world-wide financial crisis on the annual incomes of different social clas… ▽ More

    Submitted 6 November, 2014; originally announced November 2014.

  45. arXiv:1312.2722  [pdf, ps, other

    q-fin.GN

    Modelling of the European Union income distribution by extended Yakovenko formula

    Authors: Maciej Jagielski, Ryszard Kutner

    Abstract: We found a unified formula for description of the household incomes of all society classes, for instance, for the European Union in years 2005-2010. The formula is more general than well known that of Yakovenko et al. because, it satisfactorily describes not only the household incomes of low- and medium-income society classes but also the household incomes of the high-income society class. As a st… ▽ More

    Submitted 10 December, 2013; originally announced December 2013.

  46. arXiv:1312.2362  [pdf, other

    q-fin.GN physics.data-an physics.soc-ph

    Modelling the income distribution in the European Union: An application for the initial analysis of the recent worldwide financial crisis

    Authors: Maciej Jagielski, Ryszard Kutner

    Abstract: By using methods of statistical physics, we focus on the quantitative analysis of the economic income data descending from different databases. To explain our approach, we introduce the necessary theoretical background, the extended Yakovenko et al. (EY) model. This model gives an analytical description of the annual household incomes of all society classes in the European Union (i.e., the low-, m… ▽ More

    Submitted 9 December, 2013; originally announced December 2013.

  47. arXiv:1301.6519  [pdf, ps, other

    q-fin.GN physics.soc-ph

    Ab initio analysis of all income society classes in the European Union

    Authors: Maciej Jagielski, Ryszard Kutner

    Abstract: We found a unified formula for description of the household incomes of all society classes, for instance, of those of the European Union in year 2007. This formula is a stationary solution of the threshold Fokker-Planck equation (derived from the threshold nonlinear Langevin one). The formula is more general than the well known that of Yakovenko et al. because it satisfactorily describes not only… ▽ More

    Submitted 28 January, 2013; originally announced January 2013.

    Comments: Accepted for publication in Acta Physica Polonica A. arXiv admin note: substantial text overlap with arXiv:1301.2076

  48. arXiv:1301.2076  [pdf, ps, other

    q-fin.GN physics.soc-ph q-fin.ST

    Modeling of income distribution in the European Union with the Fokker-Planck equation

    Authors: Maciej Jagielski, Ryszard Kutner

    Abstract: Herein, we applied statistical physics to study incomes of three (low-, medium- and high-income) society classes instead of the two (low- and medium-income)classes studied so far. In the frame of the threshold nonlinear Langevin dynamics and its threshold Fokker-Planck counterpart, we derived a unified formula for description of income of all society classes, by way of example, of those of the Eur… ▽ More

    Submitted 10 January, 2013; originally announced January 2013.

    Comments: Accepted for publication in Physcia A