Exploiting Unintended Feature Leakage in Collaborative Learning

Slides:



Advertisements
Similar presentations
23-Aug-14 HTML/XHTML Forms. 2 What are forms? is just another kind of XHTML/HTML tag Forms are used to create (rather primitive) GUIs on Web pages Usually.
Advertisements

Technische Universität München Face Model Fitting based on Machine Learning from Multi-band Images of Facial Components Institute for Informatics Technische.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Robust Moving Object Detection & Categorization using self- improving classifiers Omar Javed, Saad Ali & Mubarak Shah.
Lecture 14 – Neural Networks
Artificial Neural Networks
Introduction to machine learning
Online Learning Algorithms
PRESETATION BY: TEJAS KAVITAKE DANIEL AKU YIRANG.
Face Alignment Using Cascaded Boosted Regression Active Shape Models
Latent (S)SVM and Cognitive Multiple People Tracker.
Support the spread of “good practice” in generating, managing, analysing and communicating spatial information Introduction to GIS for the Purpose of Practising.
BOOSTING David Kauchak CS451 – Fall Admin Final project.
 Conversation Level Constraints on Pedophile Detection in Chat Rooms PAN 2012 — Sexual Predator Identification Claudia Peersman, Frederik Vaassen, Vincent.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
1 City With a Memory CSE 535: Mobile Computing Andreea Danielescu Andrew McCord Brandon Mechtley Shawn Nikkila.
Learning to Detect Faces A Large-Scale Application of Machine Learning (This material is not in the text: for further information see the paper by P.
Fitting normal distribution: ML 1Computer vision: models, learning and inference. ©2011 Simon J.D. Prince.
Object Recognizing. Deep Learning Success in 2012 DeepNet and speech processing.
Cell Segmentation in Microscopy Imagery Using a Bag of Local Bayesian Classifiers Zhaozheng Yin RI/CMU, Fall 2009.
Deep Learning and Deep Reinforcement Learning. Topics 1.Deep learning with convolutional neural networks 2.Learning to play Atari video games with Deep.
Combining Models Foundations of Algorithms and Machine Learning (CS60020), IIT KGP, 2017: Indrajit Bhattacharya.
Big data classification using neural network
Zheng ZHANG 1-st year PhD candidate Group ILES, LIMSI
Convolutional Neural Network
Histograms CSE 6363 – Machine Learning Vassilis Athitsos
Summary of “Efficient Deep Learning for Stereo Matching”
Object Detection based on Segment Masks
Deep Learning Amin Sobhani.
Deep Reinforcement Learning
Chilimbi, et al. (2014) Microsoft Research
Mastering the game of Go with deep neural network and tree search
Machine Learning I & II.
Classification with Perceptrons Reading:
Privacy-preserving Machine Learning
Supervised Training of Deep Networks
Softmax Classifier + Generalization
Final Year Project Presentation --- Magic Paint Face
R-CNN region By Ilia Iofedov 11/11/2018 BGU, DNN course 2016.
with Daniel L. Silver, Ph.D. Christian Frey, BBA April 11-12, 2017
Presenter: Hajar Emami
Adversarially Tuned Scene Generation
State-of-the-art face recognition systems
Face Recognition with Deep Learning Method
Bolun Wang*, Yuanshun Yao, Bimal Viswanath§ Haitao Zheng, Ben Y. Zhao
Logistic Regression & Parallel SGD
CSC 578 Neural Networks and Deep Learning
On-going research on Object Detection *Some modification after seminar
Multilayer Perceptron & Backpropagation
On Convolutional Neural Network
Machine Learning Interpretability
Papers 15/08.
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
Softmax Classifier.
Machine learning overview
Neural networks (3) Regularization Autoencoder
Basics of ML Rohan Suri.
Volume 89, Issue 6, Pages (March 2016)
Multi-Information Based GCPs Selection Method
Combinatorial Topology and Distributed Computing
CIS 519 Recitation 11/15/18.
by Khaled Nasr, Pooja Viswanathan, and Andreas Nieder
The Updated experiment based on LSTM
Introduction to Neural Networks
Volume 23, Issue 21, Pages (November 2013)
Week 7 Presentation Ngoc Ta Aidean Sharghi
Metacognitive Failure as a Feature of Those Holding Radical Beliefs
Exploiting Unintended Feature Leakage in Collaborative Learning
Shengcong Chen, Changxing Ding, Minfeng Liu 2018
Presentation transcript:

Exploiting Unintended Feature Leakage in Collaborative Learning Luca Melis Congzheng Song Emiliano De Cristofaro Vitaly Shmatikov UCL Cornell Cornell Tech

Overview Collaborative learning new attack surface Predict gender Not correlated to learning task model updates leak info about training data Example: users' identities

Deep Learning Background 𝒙= 𝒚= Female 𝒉 𝟑 𝒉 𝟐 𝒉 𝟏 𝑾 𝟐 𝑾 𝟏 Map input 𝒙 to layers of features 𝒉, then to output 𝒚, connected by 𝑾 Learn parameters to minimizes loss: 𝑾= 𝐚𝐫𝐠𝐦𝐢 𝐧 𝑾 𝑳(𝒙, 𝒚) Gradient descent on parameters: In each iteration, train on a batch Update 𝑾 based on gradient of 𝑳 Gradients reveal information about the data

Distributed / Federated Learning Tensorflow Federated Gboard Multiple clients want to collaboratively train a model Server

Distributed / Federated Learning Multiple clients want to collaboratively train a model In each iteration Server Download global model from server

Distributed / Federated Learning Multiple clients want to collaboratively train a model In each iteration Server Share model updates Sharing updates rather than data... how much privacy gained? Train on a batch

Threat Model Malicious participant or server has WHITE-BOX access to model updates! What information do updates leak? Server Gradients based on a batch of data − = 𝚺 iter 𝑻+𝟏 iter 𝑻

Leakage from model updates Model updates from gradient descent: Gradient updates reveal 𝒉: 𝑦=𝑊⋅ℎ, 𝜕𝐿 𝜕𝑊 = 𝜕𝐿 𝜕𝑦 ⋅ 𝜕𝑦 𝜕𝑊 = 𝜕𝐿 𝜕𝑦 ⋅𝒉 𝒉= features of 𝒙 learned to predict 𝒚 How to infer properties from observed updates? if adversary has examples of data with these properties Use supervised learning! leaks properties of 𝒙 which are UNCORRELATED with 𝒚 e.g. gender and facial IDs

Property Inference Attacks Inferring properties from observation = learning problem iter 𝟏 iter 𝑻 iter 𝟐 … Server iter 𝒊+𝟏 iter 𝒊 − Infer Labeled with property … Train Labeled updates Labeled updates Labeled updates Property Classifier

Infer Property (Two-Party Experiment) Labeled Faces in the Wild: Participant trains on facial images with certain attributes Target label Property Correlation Attack AUC Main task and property are not correlated!

Infer Occurrence (Two-Party Experiment) FaceScrub: target=gender, property=facial IDs Participant trains on faces of different people in different iterations Probability of predicting a facial ID We show the score of predicting different identities in each round of training as shown by the color. Yellow curves show the score of predicting id 1 in each round. Changes in curves correctly corresponds to when different ids appear and disappear Infer when images of a certain person appear and disappear in training data

Active Attack Works Even Better FaceScrub: target=gender, property=facial IDs Adversary uses multi-task learning to create a model that Predicts task label Predicts property Strength of active attack Adversary can actively bias the model to leak property by sending crafted updates!

Multi-Party Experiments Observe aggregated updates Accurate inference for some properties! Yelp Review: target=review score property=authorship Unique properties are not affected For Yelp, unique word combinations identify authorship Inference is accurate for some property. The properties are so unique that aggregation does not cancel their effects in their updates. Performance drops as number of participants increases

Visualize Leakage in Feature Space Main task Circle points = Female Triangle points = Male Inferred property Blue points = Black Red points = Not black Pool1 Layer Pool2 Layer Final Layer

Takeaways Models unintentionally learn all sorts of features Collaborative training reveals white-box model updates As a result, model updates leak information about training data Thank you! Code available at: https://github.com/csong27/property-inference-collaborative-ml