Skip to main content

Showing 1–15 of 15 results for author: Backes, M

Searching in archive stat. Search in all archives.
.
  1. arXiv:2204.06963  [pdf, other

    cs.LG cs.CR stat.ML

    Finding MNEMON: Reviving Memories of Node Embeddings

    Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini

    Abstract: Previous security research efforts orbiting around graphs have been exclusively focusing on either (de-)anonymizing the graphs or understanding the security and privacy issues of graph neural networks. Little attention has been paid to understand the privacy risks of integrating the output from graph embedding models (e.g., node embeddings) with complex downstream machine learning pipelines. In th… ▽ More

    Submitted 29 April, 2022; v1 submitted 14 April, 2022; originally announced April 2022.

    Comments: To Appear in the 29th ACM Conference on Computer and Communications Security (CCS), November 7-11, 2022

  2. arXiv:2110.02631  [pdf, other

    cs.CR cs.LG stat.ML

    Inference Attacks Against Graph Neural Networks

    Authors: Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang

    Abstract: Graph is an important data representation ubiquitously existing in the real world. However, analyzing the graph data is computationally difficult due to its non-Euclidean nature. Graph embedding is a powerful tool to solve the graph analytics problem by transforming the graph data into low-dimensional vectors. These vectors could also be shared with third parties to gain additional insights of wha… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: 19 pages, 18 figures. To Appear in the 31st USENIX Security Symposium

  3. arXiv:2103.14991  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Graph Unlearning

    Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang

    Abstract: Machine unlearning is a process of removing the impact of some training data from the machine learning (ML) models upon receiving removal requests. While straightforward and legitimate, retraining the ML model from scratch incurs a high computational overhead. To address this issue, a number of approximate algorithms have been proposed in the domain of image and text data, among which SISA is the… ▽ More

    Submitted 16 September, 2022; v1 submitted 27 March, 2021; originally announced March 2021.

    Comments: To Appear in 2022 ACM SIGSAC Conference on Computer and Communications Security, November 7-11, 2022. Please cite our CCS version

  4. arXiv:2102.02551  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models

    Authors: Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang

    Abstract: Inference attacks against Machine Learning (ML) models allow adversaries to learn sensitive information about training data, model parameters, etc. While researchers have studied, in depth, several kinds of attacks, they have done so in isolation. As a result, we lack a comprehensive picture of the risks caused by the attacks, e.g., the different scenarios they can be applied to, the common factor… ▽ More

    Submitted 6 October, 2021; v1 submitted 4 February, 2021; originally announced February 2021.

  5. arXiv:2009.04872  [pdf, other

    cs.CR cs.LG stat.ML

    Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning

    Authors: Yang Zou, Zhikun Zhang, Michael Backes, Yang Zhang

    Abstract: While being deployed in many critical applications as core components, machine learning (ML) models are vulnerable to various security and privacy attacks. One major privacy attack in this domain is membership inference, where an adversary aims to determine whether a target data sample is part of the training set of a target ML model. So far, most of the current membership inference attacks are ev… ▽ More

    Submitted 10 September, 2020; originally announced September 2020.

  6. arXiv:2006.07014  [pdf, other

    cs.LG stat.ML

    How many winning tickets are there in one DNN?

    Authors: Kathrin Grosse, Michael Backes

    Abstract: The recent lottery ticket hypothesis proposes that there is one sub-network that matches the accuracy of the original network when trained in isolation. We show that instead each network contains several winning tickets, even if the initial weights are fixed. The resulting winning sub-networks are not instances of the same network under weight space symmetry, and show no overlap or correlation sig… ▽ More

    Submitted 12 June, 2020; originally announced June 2020.

    Comments: 17 pages, 15 figures, under submission

  7. arXiv:2006.06721  [pdf, other

    cs.LG cs.CR stat.ML

    Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks

    Authors: Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian Molloy

    Abstract: Backdoor attacks mislead machine-learning models to output an attacker-specified class when presented a specific trigger at test time. These attacks require poisoning the training data to compromise the learning algorithm, e.g., by injecting poisoning samples containing the trigger into the training set, along with the desired class label. Despite the increasing number of studies on backdoor attac… ▽ More

    Submitted 2 November, 2021; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: 9 pages, 7 figures, under submission

  8. arXiv:2005.02205  [pdf, other

    cs.CR cs.LG stat.ML

    When Machine Unlearning Jeopardizes Privacy

    Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang

    Abstract: The right to be forgotten states that a data owner has the right to erase their data from an entity storing it. In the context of machine learning (ML), the right to be forgotten requires an ML model owner to remove the data owner's data from the training set used to build the ML model, a process known as machine unlearning. While originally designed to protect the privacy of the data owner, we ar… ▽ More

    Submitted 14 September, 2021; v1 submitted 5 May, 2020; originally announced May 2020.

  9. arXiv:2003.03675  [pdf, other

    cs.CR cs.LG stat.ML

    Dynamic Backdoor Attacks Against Machine Learning Models

    Authors: Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang

    Abstract: Machine learning (ML) has made tremendous progress during the past decade and is being adopted in various critical real-world applications. However, recent research has shown that ML models are vulnerable to multiple security and privacy attacks. In particular, backdoor attacks against ML models have recently raised a lot of awareness. A successful backdoor attack can cause severe consequences, su… ▽ More

    Submitted 3 March, 2022; v1 submitted 7 March, 2020; originally announced March 2020.

  10. arXiv:1909.08864  [pdf, other

    cs.CR cs.LG stat.ML

    Adversarial Vulnerability Bounds for Gaussian Process Classification

    Authors: Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A Alvarez

    Abstract: Machine learning (ML) classification is increasingly used in safety-critical systems. Protecting ML classifiers from adversarial examples is crucial. We propose that the main threat is that of an attacker perturbing a confidently classified input to produce a confident misclassification. To protect against this we devise an adversarial bound (AB) for a Gaussian process classifier, that holds for t… ▽ More

    Submitted 19 September, 2019; originally announced September 2019.

    Comments: 10 pages + 2 pages references + 7 pages of supplementary. 12 figures. Submitted to AAAI

  11. arXiv:1904.01067  [pdf, other

    cs.CR cs.LG stat.ML

    Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning

    Authors: Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang

    Abstract: Machine learning (ML) has progressed rapidly during the past decade and the major factor that drives such development is the unprecedented large-scale data. As data generation is a continuous process, this leads to ML model owners updating their models frequently with newly-collected data in an online learning scenario. In consequence, if an ML model is queried with the same set of data samples at… ▽ More

    Submitted 30 November, 2019; v1 submitted 1 April, 2019; originally announced April 2019.

    Comments: USENIX Security 2020

  12. arXiv:1808.00590  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    MLCapsule: Guarded Offline Deployment of Machine Learning as a Service

    Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz

    Abstract: With the widespread use of machine learning (ML) techniques, ML as a service has become increasingly popular. In this setting, an ML model resides on a server and users can query it with their data via an API. However, if the user's input is sensitive, sending it to the server is undesirable and sometimes even legally not possible. Equally, the service provider does not want to share the model by… ▽ More

    Submitted 6 February, 2019; v1 submitted 1 August, 2018; originally announced August 2018.

  13. arXiv:1806.02032  [pdf, other

    cs.CR cs.LG stat.ML

    Killing four birds with one Gaussian process: the relation between different test-time attacks

    Authors: Kathrin Grosse, Michael T. Smith, Michael Backes

    Abstract: In machine learning (ML) security, attacks like evasion, model stealing or membership inference are generally studied in individually. Previous work has also shown a relationship between some attacks and decision function curvature of the targeted model. Consequently, we study an ML model allowing direct control over the decision surface curvature: Gaussian Process classifiers (GPCs). For evasion,… ▽ More

    Submitted 29 November, 2020; v1 submitted 6 June, 2018; originally announced June 2018.

    Comments: 10 pages, 8 figures, long version of paper accepted at ICPR 2020

  14. arXiv:1711.06598   

    cs.CR cs.LG stat.ML

    How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models

    Authors: Kathrin Grosse, David Pfaff, Michael Thomas Smith, Michael Backes

    Abstract: Machine learning models are vulnerable to Adversarial Examples: minor perturbations to input samples intended to deliberately cause misclassification. Current defenses against adversarial examples, especially for Deep Neural Networks (DNN), are primarily derived from empirical developments, and their security guarantees are often only justified retroactively. Many defenses therefore rely on hidden… ▽ More

    Submitted 3 January, 2019; v1 submitted 17 November, 2017; originally announced November 2017.

    Comments: Reasoning incomplete. Fixed issue in arXiv:1812.02606 (The limitations of model uncertainty in adversarial settings)

  15. arXiv:1702.06280  [pdf, other

    cs.CR cs.LG stat.ML

    On the (Statistical) Detection of Adversarial Examples

    Authors: Kathrin Grosse, Praveen Manoharan, Nicolas Papernot, Michael Backes, Patrick McDaniel

    Abstract: Machine Learning (ML) models are applied in a variety of tasks such as network intrusion detection or Malware classification. Yet, these models are vulnerable to a class of malicious inputs known as adversarial examples. These are slightly perturbed inputs that are classified incorrectly by the ML model. The mitigation of these adversarial inputs remains an open problem. As a step towards understa… ▽ More

    Submitted 17 October, 2017; v1 submitted 21 February, 2017; originally announced February 2017.

    Comments: 13 pages, 4 figures, 5 tables. New version: improved writing, incorporating external feedback