Data set authentication method and system based on machine learning member inference attack

An inference attack, machine learning technology, applied in machine learning, transmission systems, instruments, etc., can solve problems such as large differences in model prediction capabilities, inability to verify data sets, and difficulty in verifying indirect model-data relationships. Problems, the effect of protecting interests

Active Publication Date: 2021-08-13
HUAZHONG UNIV OF SCI & TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the protection of data sets is mainly reflected in the field of data publishing. It mainly uses technologies such as differential privacy to blur private data. This does protect some private data to a large extent, but it is impossible to verify whether the da

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data set authentication method and system based on machine learning member inference attack
  • Data set authentication method and system based on machine learning member inference attack
  • Data set authentication method and system based on machine learning member inference attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0043] In the present invention, the terms "first", "second" and the like (if any) in the present invention and drawings are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence.

[0044] figure 1 It is a flowchart of a data set authentication method based on machine learning member inference attack provided by an embodiment of the present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data set authentication method and system based on a machine learning member inference attack, and belongs to the field of data protection of the Internet of Things, and the method comprises the steps: selecting a plurality of machine learning models after obtaining a target data set and an auxiliary data set, and respectively constructing reference model groups based on the two data sets; predicting the target data set by using the two types of reference model groups to obtain a member prediction set and a non-member prediction set; taking the member prediction set and the non-member prediction set as features, taking corresponding member attributes as labels, and training to obtain an authentication model; performing member inference attack on all data in the member prediction set by using the authentication model, and screening member fingerprint data from the target data set; and based on the authentication model, obtaining the probability that the member fingerprint data is member data of the suspicious model, thereby determining whether the suspicious model is obtained by training an Interne-of-Things data set. Therefore, the interests and privacy of the data owner can be effectively protected.

Description

technical field [0001] The invention belongs to the field of Internet of Things data protection, and more specifically relates to a data set authentication method and system based on machine learning membership inference attack. Background technique [0002] The explosion of IoT data in recent years has fueled the application of machine learning in everything from natural language processing to computer vision. However, obtaining data from raw data that can be used to train machine learning models is a non-trivial task, especially at an industrial level. Specifically, collecting data requires a lot of cost and expertise, including data collection, data annotation, and data preprocessing. Furthermore, from a privacy point of view, the data may contain some sensitive records related to the data provider, and the owner of the data set is responsible for the protection of the data held by himself as mentioned in the General Data Protection Regulation; moreover , data itself is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G16Y30/10G06K9/62G06N20/00
CPCH04L63/08H04L63/0861G16Y30/10G06N20/00G06F18/241G06F18/214
Inventor 王琛刘高扬徐天龙彭凯
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products