Manipulating Transfer Learning for Property Inference

March 21, 2023 ยท Entered Twilight ยท ๐Ÿ› Computer Vision and Pattern Recognition

๐Ÿ’ค TWILIGHT: Eternal Rest
Repo abandoned since publication

Repo contents: License, README.md, ckpt_path, config.cnf, datasets, downstream_classification_batch.py, environment.yml, example_scripts, generate_features.py, losses.py, model_utils.py, models.py, permutation_invariant_network, upstream_face_gender_clean.py, upstream_face_gender_trojan.py, upstream_imagenet_new.py, utils.py, verify_meta_classification.py, verify_parameters_acc.py, verify_summary_batch.py, verify_white_box_meta_classification.py

Authors Yulong Tian, Fnu Suya, Anshuman Suri, Fengyuan Xu, David Evans arXiv ID 2303.11643 Category cs.LG: Machine Learning Cross-listed cs.AI, cs.CR Citations 9 Venue Computer Vision and Pattern Recognition Repository https://github.com/yulongt23/Transfer-Inference โญ 4 Last Checked 2 months ago
Abstract
Transfer learning is a popular method for tuning pretrained (upstream) models for different downstream tasks using limited data and computational resources. We study how an adversary with control over an upstream model used in transfer learning can conduct property inference attacks on a victim's tuned downstream model. For example, to infer the presence of images of a specific individual in the downstream training set. We demonstrate attacks in which an adversary can manipulate the upstream model to conduct highly effective and specific property inference attacks (AUC score $> 0.9$), without incurring significant performance loss on the main task. The main idea of the manipulation is to make the upstream model generate activations (intermediate features) with different distributions for samples with and without a target property, thus enabling the adversary to distinguish easily between downstream models trained with and without training examples that have the target property. Our code is available at https://github.com/yulongt23/Transfer-Inference.
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

๐Ÿ“œ Similar Papers

In the same crypt โ€” Machine Learning