通信学报 ›› 2021, Vol. 42 ›› Issue (10): 197-210.doi: 10.11959/j.issn.1000-436x.2021209

• 学术论文 • 上一篇    下一篇

面向正常拟合迁移学习模型的成员推理攻击

陈晋音1,2, 上官文昌2, 张京京3, 郑海斌2, 郑雅羽2, 张旭鸿4   

  1. 1 浙江工业大学网络空间安全研究院,浙江 杭州 310012
    2 浙江工业大学信息工程学院,浙江 杭州 310012
    3 军事科学院系统工程研究院信息系统安全技术国防科技重点实验室,北京 100039
    4 浙江大学控制科学与工程学院,浙江 杭州 310007
  • 修回日期:2021-09-27 出版日期:2021-10-25 发布日期:2021-10-01
  • 作者简介:陈晋音(1982- ),女,浙江宁波人,博士,浙江工业大学教授,主要研究方向为智能计算、数据挖掘、网络安全等
    上官文昌(1996- ),男,湖北十堰人,浙江工业大学硕士生,主要研究方向为深度学习、人工智能、深度学习、隐私攻防等
    张京京(1988- ),男,北京人,博士,军事科学院系统工程研究院工程师,主要研究方向为深度学习、人工智能和对抗性攻击和防御等
    郑海斌(1995- ),男,浙江台州人,浙江工业大学博士生,主要研究方向为深度学习、人工智能和对抗性攻击和防御等
    郑雅羽(1978- ),男,浙江温州人,博士,浙江工业大学副教授,主要研究方向为嵌入式软硬件应用开发、视频图像处理算法、服务器网络技术等
    张旭鸿(1988- ),男,河北石家庄人,博士,浙江大学助理教授,主要研究方向为分布式大数据与人工智能系统、大数据挖掘与分析、数据驱动安全、人工智能与安全等
  • 基金资助:
    国家重点研发计划基金资助项目(2018AAA0100801);国家自然科学基金资助项目(62072406);浙江省自然科学基金资助项目(LY19F020025);宁波市“科技创新2025”重大专项基金资助项目(2018B10063)

Membership inference attacks against transfer learning for generalized model

Jinyin CHEN1,2, Wenchang SHANGGUAN2, Jingjing ZHANG3, Haibin ZHENG2, Yayu ZHENG2, Xuhong ZHANG4   

  1. 1 Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou 310012, China
    2 School of Information Engineering, Zhejiang University of Technology, Hangzhou 310012, China
    3 National Key Laboratory of Science and Technology on Information System Security, Institute of System Engineering, Chinese Academy of Military Science, Beijing 100039, China
    4 School of Control Science and Engineering, Zhejiang University, Hangzhou 310007, China
  • Revised:2021-09-27 Online:2021-10-25 Published:2021-10-01
  • Supported by:
    The National Key Research and Development Program of China(2018AAA0100801);The National Natural Science Foundation of China(62072406);The Natural Science Foundation of Zhejiang Province(LY19F020025);The Major Special Funding for “Science and Technology Innovation 2025” in Ningbo(2018B10063)

摘要:

针对现有成员推理攻击(MIA)在面向正常拟合迁移学习模型时性能较差的问题,对迁移学习模型在正常拟合情况下的 MIA 进行了系统的研究,设计异常样本检测获取容易受攻击的数据样本,实现对单个样本的成员推理攻击。最终,将提出的攻击方法在 4 种图像数据集上展开攻击验证,结果表明,所提 MIA 有较好的攻击性能。例如,从VGG16(用Caltech101预训练)迁移的Flowers102分类器上,所提MIA实现了83.15%的成员推理精确率,揭示了在迁移学习环境下,即使不访问教师模型,通过访问学生模型依然能实现对教师模型的MIA。

关键词: 成员推理攻击, 深度学习, 迁移学习, 隐私风险, 正常拟合模型

Abstract:

For the problem of poor performance of exciting membership inference attack (MIA) when facing the transfer learning model that is generalized, the MIA for the transfer learning model that is generalized was first systematically studied, the anomaly detection was designed to obtain vulnerable data samples, and MIA was carried out against individual samples.Finally, the proposed method was tested on four image data sets, which shows that the proposed MIA has great attack performance.For example, on the Flowers102 classifier migrated from VGG16 (pretraining with Caltech101), the proposed MIA achieves 83.15% precision, which reveals that in the environment of transfer learning, even without access to the teacher model, the MIA for the teacher model can be achieved by visiting the student model.

Key words: membership inference attack, deep learning, transfer learning, privacy risk, generalized model

中图分类号: 

No Suggested Reading articles found!