Survey on Membership Inference Attacks Against Machine Learning
In recent years, machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing, but also been widely applied to process sensitive data such as face images, financial data and medical information.Recently, researchers find tha...
Saved in:
Published in | Ji suan ji ke xue Vol. 50; no. 3; pp. 351 - 359 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | Chinese |
Published |
Chongqing
Guojia Kexue Jishu Bu
01.03.2023
Editorial office of Computer Science |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In recent years, machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing, but also been widely applied to process sensitive data such as face images, financial data and medical information.Recently, researchers find that machine learning models will remember the data in their training sets, making them vulnerable to membership inference attacks, that is, the attacker can infer whether the given data exists in the training set of a specific machine learning model.The success of membership inference attacks may lead to serious individual privacy leakage.For example, the existence of a patient's medical record in a hospital's analytical training set reveals that the patient was once a patient there.The paper first introduces the basic principle of membership inference attacks, and then systematically summarizes and classifies the representative research achievements on membership inference attacks and defenses in recent years.In par |
---|---|
AbstractList | In recent years,machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing,but also been widely applied to process sensitive data such as face images,financial data and medical information.Recently,researchers find that machine learning models will remember the data in their training sets,making them vulnerable to membership inference attacks,that is,the attacker can infer whether the given data exists in the training set of a specific machine learning model.The success of membership inference attacks may lead to serious individual privacy leakage.For example,the existence of a patient's medical record in a hospital's analytical training set reveals that the patient was once a patient there.The paper first introduces the basic principle of membership inference attacks,and then systematically summarizes and classifies the representative research achievements on membership inference attacks and defenses in recent years.In particular,h In recent years, machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing, but also been widely applied to process sensitive data such as face images, financial data and medical information.Recently, researchers find that machine learning models will remember the data in their training sets, making them vulnerable to membership inference attacks, that is, the attacker can infer whether the given data exists in the training set of a specific machine learning model.The success of membership inference attacks may lead to serious individual privacy leakage.For example, the existence of a patient's medical record in a hospital's analytical training set reveals that the patient was once a patient there.The paper first introduces the basic principle of membership inference attacks, and then systematically summarizes and classifies the representative research achievements on membership inference attacks and defenses in recent years.In par |
Author | An, Yang Liu, Hui Peng, Yuefeng Zhao, Bo |
Author_xml | – sequence: 1 givenname: Yuefeng surname: Peng fullname: Peng, Yuefeng – sequence: 2 givenname: Bo surname: Zhao fullname: Zhao, Bo – sequence: 3 givenname: Hui surname: Liu fullname: Liu, Hui – sequence: 4 givenname: Yang surname: An fullname: An, Yang |
BookMark | eNotjjtPAkEUhafARER6y02swXk5j8oQ4oMEYiGF3ebOzF3YBWZxZjHy792IOcV5FF_ODRnENiIhd4xOGTNWPTS52f1MOaeMUsrUgAz7wCdM6M9rMs65dpQLJXuxIXn6OKVvPBdtLFZ4cJjytj4Wi1hhwuixmHUd-F0uZhuoY-6KFfhtHbFYIqRYx80tuapgn3H87yOyfnlez98my_fXxXy2nAQr5cRTLcyjoqiE0doqroL2qgKHjjkNxgQQfeXBeg0UOEdtvHSGBbAYGIoRWVywoYWmPKb6AOlctlCXf0ObNiWkrvZ7LNEidw5cCD5IcNJY7YRTrqp4RSGonnV_YR1T-3XC3JVNe0qxf19ybSm1VFIpfgHhOWad |
ContentType | Journal Article |
Copyright | Copyright Guojia Kexue Jishu Bu 2023 |
Copyright_xml | – notice: Copyright Guojia Kexue Jishu Bu 2023 |
DBID | 7SC 8FD JQ2 L7M L~C L~D DOA |
DOI | 10.11896/jsjkx.220100016 |
DatabaseName | Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Open Access Full Text |
DatabaseTitle | Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EndPage | 359 |
ExternalDocumentID | oai_doaj_org_article_e9e2bbabddcd4ab4897b3b6bff2f0ad6 |
GroupedDBID | -0Y 5XA 5XJ 7SC 8FD 92H 92I ABJNI ACGFS ALMA_UNASSIGNED_HOLDINGS CCEZO CUBFJ CW9 GROUPED_DOAJ JQ2 L7M L~C L~D TCJ TGT U1G U5S |
ID | FETCH-LOGICAL-d944-c0738560e638779626d7c6fabeb1b7a88da36fa2d9c7a0a22e78c4b81da9ed1e3 |
IEDL.DBID | DOA |
ISSN | 1002-137X |
IngestDate | Wed Aug 27 01:31:54 EDT 2025 Sun Jun 29 13:23:38 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 3 |
Language | Chinese |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-d944-c0738560e638779626d7c6fabeb1b7a88da36fa2d9c7a0a22e78c4b81da9ed1e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
OpenAccessLink | https://doaj.org/article/e9e2bbabddcd4ab4897b3b6bff2f0ad6 |
PQID | 2790090404 |
PQPubID | 2048282 |
PageCount | 9 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_e9e2bbabddcd4ab4897b3b6bff2f0ad6 proquest_journals_2790090404 |
PublicationCentury | 2000 |
PublicationDate | 2023-03-01 |
PublicationDateYYYYMMDD | 2023-03-01 |
PublicationDate_xml | – month: 03 year: 2023 text: 2023-03-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Chongqing |
PublicationPlace_xml | – name: Chongqing |
PublicationTitle | Ji suan ji ke xue |
PublicationYear | 2023 |
Publisher | Guojia Kexue Jishu Bu Editorial office of Computer Science |
Publisher_xml | – name: Guojia Kexue Jishu Bu – name: Editorial office of Computer Science |
SSID | ssib023646461 ssib051375750 ssib001164759 ssj0057673 |
Score | 2.3085966 |
Snippet | In recent years, machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing, but... In recent years,machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing,but... |
SourceID | doaj proquest |
SourceType | Open Website Aggregation Database |
StartPage | 351 |
SubjectTerms | Computer vision Inference Machine learning machine learning|membership inference|privacy leakage|privacy protection Natural language processing Privacy Training |
Title | Survey on Membership Inference Attacks Against Machine Learning |
URI | https://www.proquest.com/docview/2790090404 https://doaj.org/article/e9e2bbabddcd4ab4897b3b6bff2f0ad6 |
Volume | 50 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxa-EYWCPLCGOo7js8eCQAWpTEXqFp1jp1CkFrUpAn49dj5EJQYWxmSJfJe7e5af3yPk0rqcFYxh5ILOkNAOI4RCRQUYsBjbhNuK5fsoh0_iYZJONqy-AieslgeuA9d32nFj0FibW4FGKA0mMdIUBS8Y2kps28-8jc1UBQSCTNbPoA4q6XJDOC2NE_A4hbU924NuqKn4weojgUl7oKm07M9Ws9ePKx6OjQNAasT9f_XuaiDd7ZGdBknSQb2CfbL19XxAdluXBtoU7aGH4-vlu_ukizkduWD_EfhZ9L696EcHZRnu2dPBFF88VqSjil7paKO8Oj0i47vb8c0wamwTIquFiHIWBGokc76yALTfsFjIZYHGd2UDqJTFxD9yq3NAhpw7ULkwHreidjZ2yTHpzBdzd0JoWkiFoGSsHAgPZTCNkSda5uhQydR2yXUIRfZWC2NkQaq6euETmDUJzP5KYJf02kBmTf2sMg7agz_fYMTpf3zjjGwHm_iaO9YjnXK5duceTJTmovpvvgEixsYd |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Survey+on+Membership+Inference+Attacks+Against+Machine+Learning&rft.jtitle=Ji+suan+ji+ke+xue&rft.au=PENG+Yuefeng%2C+ZHAO+Bo%2C+LIU+Hui%2C+AN+Yang&rft.date=2023-03-01&rft.pub=Editorial+office+of+Computer+Science&rft.issn=1002-137X&rft.volume=50&rft.issue=3&rft.spage=351&rft.epage=359&rft_id=info:doi/10.11896%2Fjsjkx.220100016&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_e9e2bbabddcd4ab4897b3b6bff2f0ad6 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1002-137X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1002-137X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1002-137X&client=summon |