Survey on Membership Inference Attacks Against Machine Learning

In recent years, machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing, but also been widely applied to process sensitive data such as face images, financial data and medical information.Recently, researchers find tha...

Full description

Saved in:
Bibliographic Details
Published inJi suan ji ke xue Vol. 50; no. 3; pp. 351 - 359
Main Authors Peng, Yuefeng, Zhao, Bo, Liu, Hui, An, Yang
Format Journal Article
LanguageChinese
Published Chongqing Guojia Kexue Jishu Bu 01.03.2023
Editorial office of Computer Science
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In recent years, machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing, but also been widely applied to process sensitive data such as face images, financial data and medical information.Recently, researchers find that machine learning models will remember the data in their training sets, making them vulnerable to membership inference attacks, that is, the attacker can infer whether the given data exists in the training set of a specific machine learning model.The success of membership inference attacks may lead to serious individual privacy leakage.For example, the existence of a patient's medical record in a hospital's analytical training set reveals that the patient was once a patient there.The paper first introduces the basic principle of membership inference attacks, and then systematically summarizes and classifies the representative research achievements on membership inference attacks and defenses in recent years.In par
AbstractList In recent years,machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing,but also been widely applied to process sensitive data such as face images,financial data and medical information.Recently,researchers find that machine learning models will remember the data in their training sets,making them vulnerable to membership inference attacks,that is,the attacker can infer whether the given data exists in the training set of a specific machine learning model.The success of membership inference attacks may lead to serious individual privacy leakage.For example,the existence of a patient's medical record in a hospital's analytical training set reveals that the patient was once a patient there.The paper first introduces the basic principle of membership inference attacks,and then systematically summarizes and classifies the representative research achievements on membership inference attacks and defenses in recent years.In particular,h
In recent years, machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing, but also been widely applied to process sensitive data such as face images, financial data and medical information.Recently, researchers find that machine learning models will remember the data in their training sets, making them vulnerable to membership inference attacks, that is, the attacker can infer whether the given data exists in the training set of a specific machine learning model.The success of membership inference attacks may lead to serious individual privacy leakage.For example, the existence of a patient's medical record in a hospital's analytical training set reveals that the patient was once a patient there.The paper first introduces the basic principle of membership inference attacks, and then systematically summarizes and classifies the representative research achievements on membership inference attacks and defenses in recent years.In par
Author An, Yang
Liu, Hui
Peng, Yuefeng
Zhao, Bo
Author_xml – sequence: 1
  givenname: Yuefeng
  surname: Peng
  fullname: Peng, Yuefeng
– sequence: 2
  givenname: Bo
  surname: Zhao
  fullname: Zhao, Bo
– sequence: 3
  givenname: Hui
  surname: Liu
  fullname: Liu, Hui
– sequence: 4
  givenname: Yang
  surname: An
  fullname: An, Yang
BookMark eNotjjtPAkEUhafARER6y02swXk5j8oQ4oMEYiGF3ebOzF3YBWZxZjHy792IOcV5FF_ODRnENiIhd4xOGTNWPTS52f1MOaeMUsrUgAz7wCdM6M9rMs65dpQLJXuxIXn6OKVvPBdtLFZ4cJjytj4Wi1hhwuixmHUd-F0uZhuoY-6KFfhtHbFYIqRYx80tuapgn3H87yOyfnlez98my_fXxXy2nAQr5cRTLcyjoqiE0doqroL2qgKHjjkNxgQQfeXBeg0UOEdtvHSGBbAYGIoRWVywoYWmPKb6AOlctlCXf0ObNiWkrvZ7LNEidw5cCD5IcNJY7YRTrqp4RSGonnV_YR1T-3XC3JVNe0qxf19ybSm1VFIpfgHhOWad
ContentType Journal Article
Copyright Copyright Guojia Kexue Jishu Bu 2023
Copyright_xml – notice: Copyright Guojia Kexue Jishu Bu 2023
DBID 7SC
8FD
JQ2
L7M
L~C
L~D
DOA
DOI 10.11896/jsjkx.220100016
DatabaseName Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Open Access Full Text
DatabaseTitle Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EndPage 359
ExternalDocumentID oai_doaj_org_article_e9e2bbabddcd4ab4897b3b6bff2f0ad6
GroupedDBID -0Y
5XA
5XJ
7SC
8FD
92H
92I
ABJNI
ACGFS
ALMA_UNASSIGNED_HOLDINGS
CCEZO
CUBFJ
CW9
GROUPED_DOAJ
JQ2
L7M
L~C
L~D
TCJ
TGT
U1G
U5S
ID FETCH-LOGICAL-d944-c0738560e638779626d7c6fabeb1b7a88da36fa2d9c7a0a22e78c4b81da9ed1e3
IEDL.DBID DOA
ISSN 1002-137X
IngestDate Wed Aug 27 01:31:54 EDT 2025
Sun Jun 29 13:23:38 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 3
Language Chinese
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-d944-c0738560e638779626d7c6fabeb1b7a88da36fa2d9c7a0a22e78c4b81da9ed1e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://doaj.org/article/e9e2bbabddcd4ab4897b3b6bff2f0ad6
PQID 2790090404
PQPubID 2048282
PageCount 9
ParticipantIDs doaj_primary_oai_doaj_org_article_e9e2bbabddcd4ab4897b3b6bff2f0ad6
proquest_journals_2790090404
PublicationCentury 2000
PublicationDate 2023-03-01
PublicationDateYYYYMMDD 2023-03-01
PublicationDate_xml – month: 03
  year: 2023
  text: 2023-03-01
  day: 01
PublicationDecade 2020
PublicationPlace Chongqing
PublicationPlace_xml – name: Chongqing
PublicationTitle Ji suan ji ke xue
PublicationYear 2023
Publisher Guojia Kexue Jishu Bu
Editorial office of Computer Science
Publisher_xml – name: Guojia Kexue Jishu Bu
– name: Editorial office of Computer Science
SSID ssib023646461
ssib051375750
ssib001164759
ssj0057673
Score 2.3085966
Snippet In recent years, machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing, but...
In recent years,machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing,but...
SourceID doaj
proquest
SourceType Open Website
Aggregation Database
StartPage 351
SubjectTerms Computer vision
Inference
Machine learning
machine learning|membership inference|privacy leakage|privacy protection
Natural language processing
Privacy
Training
Title Survey on Membership Inference Attacks Against Machine Learning
URI https://www.proquest.com/docview/2790090404
https://doaj.org/article/e9e2bbabddcd4ab4897b3b6bff2f0ad6
Volume 50
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxa-EYWCPLCGOo7js8eCQAWpTEXqFp1jp1CkFrUpAn49dj5EJQYWxmSJfJe7e5af3yPk0rqcFYxh5ILOkNAOI4RCRQUYsBjbhNuK5fsoh0_iYZJONqy-AieslgeuA9d32nFj0FibW4FGKA0mMdIUBS8Y2kps28-8jc1UBQSCTNbPoA4q6XJDOC2NE_A4hbU924NuqKn4weojgUl7oKm07M9Ws9ePKx6OjQNAasT9f_XuaiDd7ZGdBknSQb2CfbL19XxAdluXBtoU7aGH4-vlu_ukizkduWD_EfhZ9L696EcHZRnu2dPBFF88VqSjil7paKO8Oj0i47vb8c0wamwTIquFiHIWBGokc76yALTfsFjIZYHGd2UDqJTFxD9yq3NAhpw7ULkwHreidjZ2yTHpzBdzd0JoWkiFoGSsHAgPZTCNkSda5uhQydR2yXUIRfZWC2NkQaq6euETmDUJzP5KYJf02kBmTf2sMg7agz_fYMTpf3zjjGwHm_iaO9YjnXK5duceTJTmovpvvgEixsYd
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Survey+on+Membership+Inference+Attacks+Against+Machine+Learning&rft.jtitle=Ji+suan+ji+ke+xue&rft.au=PENG+Yuefeng%2C+ZHAO+Bo%2C+LIU+Hui%2C+AN+Yang&rft.date=2023-03-01&rft.pub=Editorial+office+of+Computer+Science&rft.issn=1002-137X&rft.volume=50&rft.issue=3&rft.spage=351&rft.epage=359&rft_id=info:doi/10.11896%2Fjsjkx.220100016&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_e9e2bbabddcd4ab4897b3b6bff2f0ad6
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1002-137X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1002-137X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1002-137X&client=summon