Asurvey on membership inference attacks and defenses in Machine Learning
NIU Jun,MA Xiaoji,CHEN Ying,ZHANG Ge,HE Zhipeng,HOU Zhexian,ZHU Xiaoyan,WU Gaofei,CHEN Kai,ZHANG Yuqing
DOI: https://doi.org/10.19363/J.cnki.cn10-1380/tn.2022.11.01
2022-01-01
Journal of Cyber Security
Abstract:The newly emerged machine learning(ML) methods have been widely applied to various applications, and have become a strong driving force to revolutionize a wide range of industries, which have greatly promoted the prosperity and development of artificial intelligence. Meanwhile, the training and inference of the machine learning model are based on a large amount of data, which always contains some private information. And the privacy and security of the ML has faced serious challenges. Membership inference attacks(MIAs) mainly aim to infer whether a data record was used to train a target model or not. MIAs have not only been shown to be effective on various ML models(e.g., classification models and generative models), but also have been penetrated into the fields of image classification, speech recognition, natural language processing, computer vision and so on, which creates a great security threat to the long-term development of machine learning.Therefore, in order to better improve the security of ML models for membership inference attacks, in this paper, we systematically introduce and analyze the basic principles and characteristics of the MIAs and their defenses from a ML attack-defense perspective. Firstly, we introduce the definitions and threat models of the MIAs, and classify these MIAs from six different perspectives such as attacks’ principles, scenarios, background knowledge, target models, fields and the size of attack datasets, and we compare their advantages and disadvantages. Secondly, we summary the reasons caused the MIAs from three aspects, namely diversity of training data, types of target models and overfitting of target models. Thirdly, we survey defensive techniques for MIAs as well as their characteristics by differential privacy, regularization, data argumentation,model stacking, early stopping, confidence score masking and knowledge distillation. Futhermore, we institute the evaluation metrics and datasets used in MIAs, and the other applications of the MIAs. Finally, by comparing and analyzing the existing MIAs and their defenses, we discuss the challenges and future research directions.