SlideShare a Scribd company logo
Defending against Machine Learning based
Inference Attacks using Adversarial Examples
Jinyuan Jia, Neil Zhenqiang Gong
Department of Electrical and Computer Engineering
1
Machine Learning based Inference Attacks
Input: User’s public data
Output: User’s private data
Private data and public data are statistically correlated
Machine
learning
classifier
Public data Private data
(Public data, Private data)
2
Machine Learning based Inference Attacks are Pervasive
Attribute inference attacks
Public: Rating scores, page likes, social friends.
Private: Age, gender, political view
Author identification attacks
Public: Text document, program
Private: Author identity
Website fingerprinting attacks
Public: Network traffic
Private: Websites
Membership inference attacks
Public: Confidence scores, gradients
Private: Member/Non-member 3
Threat Model
True public data
DefenderUser Attacker
Noisy public data Private data
4
Challenges
The defender doesn’t know the attacker’s classifier
The defender itself learn a classifier
Transferability: similar classification boundaries
Satisfy utility constraints
Find a mechanism to add random noise
 is the conditional probability that defender will add noise to user’s
true public data
Sample from to add noise
5
M
*
( | )M r x r
x
M
Overview
Challenge to find the mechanism :
The probabilistic mapping is exponential to the
dimensionality of
Categorize noise space into groups to solve the challenge…
0x+r
1x+r
ix+r
1ix+r
…
1nk 
x +r
2n
k 
x +r
mapping
… Class 1
Class 2
Class m
Output of
Output of
Output of
6
M
Two-Phase Framework
Phase I: For each noise group, find a minimum noise as representative
noise
Phase II: Simplify the mechanism to be a probability distribution
over representative noise
7
Thanks
• Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, and Neil Zhenqiang
Gong. "MemGuard: Defending against Black-Box Membership Inference Attacks
via Adversarial Examples". In ACM Conference on Computer and Communications
Security (CCS), 2019.
• Jinyuan Jia and Neil Zhenqiang Gong. "AttriGuard: A Practical Defense Against
Attribute Inference Attacks via Adversarial Machine Learning". In USENIX Security
Symposium, 2018.
8

More Related Content

PPT
presentation29
PPT
INFO4990_Hossain
PDF
A survey on automatic detection of hate speech in text
PDF
Tag recommendation in social bookmarking sites like deli
PDF
Extraction and Analysis of Publication Data of Conferences - ICACCE 2015
PPTX
Analysis Tweets Korea Politicians(25 Sep2009)Sj
PPTX
I’m going to go... stalk... Lenny and Carl...
PPTX
11 Network Experiments and Interventions
presentation29
INFO4990_Hossain
A survey on automatic detection of hate speech in text
Tag recommendation in social bookmarking sites like deli
Extraction and Analysis of Publication Data of Conferences - ICACCE 2015
Analysis Tweets Korea Politicians(25 Sep2009)Sj
I’m going to go... stalk... Lenny and Carl...
11 Network Experiments and Interventions

What's hot (20)

PDF
Ucs813 syllabus
DOCX
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
PPTX
Disciplinary Differences in Twitter Scholarly Communication
PPT
Stalking On Campus Webinar
PPTX
Target link presentation
PDF
AINL 2016: Shavrina, Selegey
PPTX
Candidates' Communication patterns on Twitter
PPTX
Is twitter a public sphere for online conflicts soc info
DOCX
discovering emerging topics in social
PDF
Final Poster for Engineering Showcase
PPTX
Cite track presentation
PPSX
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
PPTX
Neso nuffic presentation in Seoul
PDF
ECIR2017-Inferring User Interests for Passive Users on Twitter by Leveraging ...
PDF
Webenza IncPot
PPTX
Geo-information and Twitter Use
PPTX
Opinion leadership on twitter xu ica2013
PPTX
36 students' interactin with librarians through twitter
PPTX
Hybrid sentiment and network analysis of social opinion polarization icoict
PPT
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Ucs813 syllabus
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
Disciplinary Differences in Twitter Scholarly Communication
Stalking On Campus Webinar
Target link presentation
AINL 2016: Shavrina, Selegey
Candidates' Communication patterns on Twitter
Is twitter a public sphere for online conflicts soc info
discovering emerging topics in social
Final Poster for Engineering Showcase
Cite track presentation
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Neso nuffic presentation in Seoul
ECIR2017-Inferring User Interests for Passive Users on Twitter by Leveraging ...
Webenza IncPot
Geo-information and Twitter Use
Opinion leadership on twitter xu ica2013
36 students' interactin with librarians through twitter
Hybrid sentiment and network analysis of social opinion polarization icoict
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Ad

Similar to 2019 Triangle Machine Learning Day - Defending against Machine Learning based Inference Attacks using Adversarial Examples as Deceptive Mechanisms - Jinyuan Jia, September 20, 2019 (20)

DOCX
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
PDF
20160831_app_storesecurity_Seminar
PDF
Threat Sharing for Human Rights
PPTX
Unit-2 Network Security Concepts (1).pptx
PPTX
Research on AI using Cyber Security and Forensics
PPTX
OSI_Security_Architecture Computer Science.pptx
PPTX
02 fundamental aspects of security
PPTX
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
PDF
Network security
PDF
10 IJAERS-JUN-2015-42-Social Engineering on Social Networking sites
DOCX
Retrieving Hidden Friends: A Collusion PrivacyAttack Against Online Friend Se...
PPT
Capabilities of Cyber-Trerrorists - POTENTIAL ATTACKS - Possibility, Likelyho...
PPTX
Insider Threat Solution from GTRI
PPT
Machine Introduce for Beginner 5000-1222.ppt
PPTX
INFO.pptx this is reagarding to the information system security and types of ...
PDF
Corporate threat vector and landscape
PPT
Ch01 Introduction to Security
DOCX
Journal of Computer and System Sciences 80 (2014) 973–993Con
DOCX
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
PPT
Protection and Security in Operating Systems
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
20160831_app_storesecurity_Seminar
Threat Sharing for Human Rights
Unit-2 Network Security Concepts (1).pptx
Research on AI using Cyber Security and Forensics
OSI_Security_Architecture Computer Science.pptx
02 fundamental aspects of security
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
Network security
10 IJAERS-JUN-2015-42-Social Engineering on Social Networking sites
Retrieving Hidden Friends: A Collusion PrivacyAttack Against Online Friend Se...
Capabilities of Cyber-Trerrorists - POTENTIAL ATTACKS - Possibility, Likelyho...
Insider Threat Solution from GTRI
Machine Introduce for Beginner 5000-1222.ppt
INFO.pptx this is reagarding to the information system security and types of ...
Corporate threat vector and landscape
Ch01 Introduction to Security
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Protection and Security in Operating Systems
Ad

More from The Statistical and Applied Mathematical Sciences Institute (20)

PDF
Causal Inference Opening Workshop - Latent Variable Models, Causal Inference,...
PDF
2019 Fall Series: Special Guest Lecture - 0-1 Phase Transitions in High Dimen...
PDF
Causal Inference Opening Workshop - Causal Discovery in Neuroimaging Data - F...
PDF
Causal Inference Opening Workshop - Smooth Extensions to BART for Heterogeneo...
PDF
Causal Inference Opening Workshop - A Bracketing Relationship between Differe...
PDF
Causal Inference Opening Workshop - Testing Weak Nulls in Matched Observation...
PPTX
Causal Inference Opening Workshop - Difference-in-differences: more than meet...
PDF
Causal Inference Opening Workshop - New Statistical Learning Methods for Esti...
PDF
Causal Inference Opening Workshop - Bipartite Causal Inference with Interfere...
PPTX
Causal Inference Opening Workshop - Bridging the Gap Between Causal Literatur...
PDF
Causal Inference Opening Workshop - Some Applications of Reinforcement Learni...
PDF
Causal Inference Opening Workshop - Bracketing Bounds for Differences-in-Diff...
PDF
Causal Inference Opening Workshop - Assisting the Impact of State Polcies: Br...
PDF
Causal Inference Opening Workshop - Experimenting in Equilibrium - Stefan Wag...
PDF
Causal Inference Opening Workshop - Targeted Learning for Causal Inference Ba...
PDF
Causal Inference Opening Workshop - Bayesian Nonparametric Models for Treatme...
PPTX
2019 Fall Series: Special Guest Lecture - Adversarial Risk Analysis of the Ge...
PPTX
2019 Fall Series: Professional Development, Writing Academic Papers…What Work...
PDF
2019 GDRR: Blockchain Data Analytics - Machine Learning in/for Blockchain: Fu...
PDF
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
Causal Inference Opening Workshop - Latent Variable Models, Causal Inference,...
2019 Fall Series: Special Guest Lecture - 0-1 Phase Transitions in High Dimen...
Causal Inference Opening Workshop - Causal Discovery in Neuroimaging Data - F...
Causal Inference Opening Workshop - Smooth Extensions to BART for Heterogeneo...
Causal Inference Opening Workshop - A Bracketing Relationship between Differe...
Causal Inference Opening Workshop - Testing Weak Nulls in Matched Observation...
Causal Inference Opening Workshop - Difference-in-differences: more than meet...
Causal Inference Opening Workshop - New Statistical Learning Methods for Esti...
Causal Inference Opening Workshop - Bipartite Causal Inference with Interfere...
Causal Inference Opening Workshop - Bridging the Gap Between Causal Literatur...
Causal Inference Opening Workshop - Some Applications of Reinforcement Learni...
Causal Inference Opening Workshop - Bracketing Bounds for Differences-in-Diff...
Causal Inference Opening Workshop - Assisting the Impact of State Polcies: Br...
Causal Inference Opening Workshop - Experimenting in Equilibrium - Stefan Wag...
Causal Inference Opening Workshop - Targeted Learning for Causal Inference Ba...
Causal Inference Opening Workshop - Bayesian Nonparametric Models for Treatme...
2019 Fall Series: Special Guest Lecture - Adversarial Risk Analysis of the Ge...
2019 Fall Series: Professional Development, Writing Academic Papers…What Work...
2019 GDRR: Blockchain Data Analytics - Machine Learning in/for Blockchain: Fu...
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...

Recently uploaded (20)

PPTX
Lesson notes of climatology university.
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Complications of Minimal Access Surgery at WLH
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Insiders guide to clinical Medicine.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Pharma ospi slides which help in ospi learning
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Cell Types and Its function , kingdom of life
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Computing-Curriculum for Schools in Ghana
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
Lesson notes of climatology university.
GDM (1) (1).pptx small presentation for students
Complications of Minimal Access Surgery at WLH
Supply Chain Operations Speaking Notes -ICLT Program
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Insiders guide to clinical Medicine.pdf
O7-L3 Supply Chain Operations - ICLT Program
Pharma ospi slides which help in ospi learning
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Microbial diseases, their pathogenesis and prophylaxis
Cell Types and Its function , kingdom of life
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Anesthesia in Laparoscopic Surgery in India
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Computing-Curriculum for Schools in Ghana
2.FourierTransform-ShortQuestionswithAnswers.pdf

2019 Triangle Machine Learning Day - Defending against Machine Learning based Inference Attacks using Adversarial Examples as Deceptive Mechanisms - Jinyuan Jia, September 20, 2019

  • 1. Defending against Machine Learning based Inference Attacks using Adversarial Examples Jinyuan Jia, Neil Zhenqiang Gong Department of Electrical and Computer Engineering 1
  • 2. Machine Learning based Inference Attacks Input: User’s public data Output: User’s private data Private data and public data are statistically correlated Machine learning classifier Public data Private data (Public data, Private data) 2
  • 3. Machine Learning based Inference Attacks are Pervasive Attribute inference attacks Public: Rating scores, page likes, social friends. Private: Age, gender, political view Author identification attacks Public: Text document, program Private: Author identity Website fingerprinting attacks Public: Network traffic Private: Websites Membership inference attacks Public: Confidence scores, gradients Private: Member/Non-member 3
  • 4. Threat Model True public data DefenderUser Attacker Noisy public data Private data 4
  • 5. Challenges The defender doesn’t know the attacker’s classifier The defender itself learn a classifier Transferability: similar classification boundaries Satisfy utility constraints Find a mechanism to add random noise  is the conditional probability that defender will add noise to user’s true public data Sample from to add noise 5 M * ( | )M r x r x M
  • 6. Overview Challenge to find the mechanism : The probabilistic mapping is exponential to the dimensionality of Categorize noise space into groups to solve the challenge… 0x+r 1x+r ix+r 1ix+r … 1nk  x +r 2n k  x +r mapping … Class 1 Class 2 Class m Output of Output of Output of 6 M
  • 7. Two-Phase Framework Phase I: For each noise group, find a minimum noise as representative noise Phase II: Simplify the mechanism to be a probability distribution over representative noise 7
  • 8. Thanks • Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, and Neil Zhenqiang Gong. "MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples". In ACM Conference on Computer and Communications Security (CCS), 2019. • Jinyuan Jia and Neil Zhenqiang Gong. "AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning". In USENIX Security Symposium, 2018. 8