skip to main content
research-article

Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks

Published:26 June 2023Publication History
Skip Abstract Section

Abstract

Collaborative machine learning settings such as federated learning can be susceptible to adversarial interference and attacks. One class of such attacks is termed model inversion attacks, characterised by the adversary reverse-engineering the model into disclosing the training data. Previous implementations of this attack typically only rely on the shared data representations, ignoring the adversarial priors, or require that specific layers are present in the target model, reducing the potential attack surface. In this work, we propose a novel context-agnostic model inversion framework that builds on the foundations of gradient-based inversion attacks, but additionally exploits the features and the style of the data controlled by an in-the-network adversary. Our technique outperforms existing gradient-based approaches both qualitatively and quantitatively across all training settings, showing particular effectiveness against the collaborative medical imaging tasks. Finally, we demonstrate that our method achieves significant success on two downstream tasks: sensitive feature inference and facial recognition spoofing.

Skip Supplemental Material Section

Supplemental Material

REFERENCES

  1. [1] Abadi Martin, Chu Andy, Goodfellow Ian, McMahan H. Brendan, Mironov Ilya, Talwar Kunal, and Zhang Li. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 308318.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Borja Balle, Giovanni Cherubin, and Jamie Hayes. 2022. Reconstructing training data with informed adversaries. In 2022 IEEE Symposium on Security and Privacy (SP). (2022), 11381156.Google ScholarGoogle Scholar
  3. [3] Bonawitz Keith, Ivanov Vladimir, Kreuter Ben, Marcedone Antonio, McMahan H. Brendan, Patel Sarvar, Ramage Daniel, Segal Aaron, and Seth Karn. 2016. Practical secure aggregation for federated learning on user-held data. In NIPS Workshop on Private Multi-Party Machine Learning (2016).Google ScholarGoogle Scholar
  4. [4] Burns Joseph E., Yao Jianhua, Chalhoub Didier, Chen Joseph J., and Summers Ronald M.. 2020. A machine learning algorithm to estimate sarcopenia on abdominal CT. Academic Radiology 27, 3 (2020), 311320.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Chen Liang, Bentley Paul, Mori Kensaku, Misawa Kazunari, Fujiwara Michitaka, and Rueckert Daniel. 2019. Self-supervised learning for medical image analysis using image context restoration. Medical Image Analysis 58 (2019), 101539.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Dong Chao, Loy Chen Change, He Kaiming, and Tang Xiaoou. 2015. Image super-resolution using deep convolutional networks. IEEE Transactions on Pattern Analysis and Machine Intelligence 38, 2 (2015), 295307.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Dubey Abhimanyu, Gupta Otkrist, Guo Pei, Raskar Ramesh, Farrell Ryan, and Naik Nikhil. 2018. Pairwise confusion for fine-grained visual classification. In Proceedings of the European conference on computer vision. 7086.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Ebner Natalie C., Riediger Michaela, and Lindenberger Ulman. 2010. FACES–A database of facial expressions in young, middle-aged, and older women and men: Development and validation. Behavior Research Methods 42, 1 (2010), 351362.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Elaziz Mohamed Abd, Hosny Khalid M., Salah Ahmad, Darwish Mohamed M., Lu Songfeng, and Sahlol Ahmed T.. 2020. New machine learning method for image-based diagnosis of COVID-19. Plos One 15, 6 (2020), e0235187.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Erdogmus Nesli and Marcel Sébastien. 2013. Spoofing 2D face recognition systems with 3D masks. In Proceedings of the 2013 International Conference of the BIOSIG Special Interest Group. IEEE, 18.Google ScholarGoogle Scholar
  11. [11] Fredrikson Matt, Jha Somesh, and Ristenpart Thomas. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 13221333.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Gatys Leon, Ecker Alexander S., and Bethge Matthias. 2015. Texture synthesis using convolutional neural networks. Advances in Neural Information Processing Systems 28 (2015), 262270.Google ScholarGoogle Scholar
  13. [13] Jonas Geiping, Hartmut Bauermeister, Hannah Dröge, and Michael Moeller. 2020. Inverting gradients-how easy is it to break privacy in federated learning? Advances in Neural Information Processing Systems 33 (2020), 1693716947.Google ScholarGoogle Scholar
  14. [14] Gong Neil Zhenqiang and Liu Bin. 2016. You are who you know and how you behave: Attribute inference attacks via users’ social friends and behaviors. In Proceedings of the 25th USENIX Security Symposium. 979995.Google ScholarGoogle Scholar
  15. [15] Ali Hatamizadeh, Hongxu Yin, Pavlo Molchanov, Andriy Myronenko, Wenqi Li, Prerna Dogra, Andrew Feng, et al. 2023. Do gradient inversion attacks make federated learning unsafe? IEEE Transactions on Medical Imaging (2023).Google ScholarGoogle Scholar
  16. [16] He Zecheng, Zhang Tianwei, and Lee Ruby B.. 2019. Model inversion attacks against collaborative inference. In Proceedings of the 35th Annual Computer Security Applications Conference. 148162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Huang Jia-Bin, Singh Abhishek, and Ahuja Narendra. 2015. Single image super-resolution from transformed self-exemplars. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 51975206.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Johnson Justin, Alahi Alexandre, and Fei-Fei Li. 2016. Perceptual losses for real-time style transfer and super-resolution. In Proceedings of the European Conference on Computer Vision. Springer, 694711.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Kaissis Georgios, Ziller Alexander, Passerat-Palmbach Jonathan, Ryffel Théo, Usynin Dmitrii, Trask Andrew, Lima Ionésio, Mancuso Jason, Jungmann Friederike, Steinborn Marc-Matthias, et al. 2021. End-to-end privacy preserving deep learning on multi-institutional medical imaging. Nature Machine Intelligence 3, 6 (2021), 473484.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Klause Helena, Ziller Alexander, Rueckert Daniel, Hammernik Kerstin, and Kaissis Georgios. 2022. Differentially private training of residual networks with scale normalisation. In ICML Workshop on Theory and Practise of Differential Privacy (TPDP’2022).Google ScholarGoogle Scholar
  21. [21] Konečnỳ Jakub, McMahan H Brendan, Yu Felix X., Richtárik Peter, Suresh Ananda Theertha, and Bacon Dave. 2016. Federated learning: Strategies for improving communication efficiency. arXiv:1610.05492 (2016). Retrieved from https://arxiv.org/abs/1610.05492.Google ScholarGoogle Scholar
  22. [22] Xiaoxiao Li, Meirui Jiang, Xiaofei Zhang, Michael Kamp, and Qi Dou. 2021. Fedbn: Federated learning on non-iid features via local batch normalization. In International Conference on Learning Representations (2021).Google ScholarGoogle Scholar
  23. [23] Ilya Loshchilov and Hutter Frank. 2019. Decoupled weight decay regularization. Proceedings of ICLR 7 (2019).Google ScholarGoogle Scholar
  24. [24] Mahendran Aravindh and Vedaldi Andrea. 2015. Understanding deep image representations by inverting them. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 51885196.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Melis Luca, Song Congzheng, Cristofaro Emiliano De, and Shmatikov Vitaly. 2019. Exploiting unintended feature leakage in collaborative learning. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP’19). IEEE, 691706.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Menze Bjoern H., Jakab Andras, Bauer Stefan, Kalpathy-Cramer Jayashree, Farahani Keyvan, Kirby Justin, Burren Yuliya, Porz Nicole, Slotboom Johannes, Wiest Roland, et al. 2014. The multimodal brain tumor image segmentation benchmark (BRATS). IEEE Transactions on Medical Imaging 34, 10 (2014), 19932024.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Ming Zuheng, Visani Muriel, Luqman Muhammad Muzzamil, and Burie Jean-Christophe. 2020. A survey on anti-spoofing methods for facial recognition with rgb cameras of generic consumer devices. Journal of Imaging 6, 12 (2020), 139.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Nasr Milad, Shokri Reza, and Houmansadr Amir. 2019. Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In Proceedings of the 2019 IEEE Symposium on Security and Privacy. IEEE, 739753.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Nguyen Anh, Yosinski Jason, and Clune Jeff. 2015. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 427436.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Patel Jigar, Shah Sahil, Thakkar Priyank, and Kotecha Ketan. 2015. Predicting stock market index using fusion of machine learning techniques. Expert Systems with Applications 42, 4 (2015), 21622172.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Rajpurkar Pranav, Irvin Jeremy, Zhu Kaylie, Yang Brandon, Mehta Hershel, Duan Tony, Ding Daisy, Bagul Aarti, Langlotz Curtis, Shpanskaya Katie, et al. 2017. Chexnet: Radiologist-level pneumonia detection on chest x-rays with deep learning. arXiv:1711.05225 (2017). Retrieved from https://arxiv.org/abs/1711.05225.Google ScholarGoogle Scholar
  32. [32] Remerscheid Nicolas W., Ziller Alexander, Rueckert Daniel, and Kaissis Georgios. 2022. SmoothNets: Optimizing CNN architecture design for differentially private deep learning. arXiv:2205.04095 (2022). Retrieved from https://arxiv.org/abs/2205.04095.Google ScholarGoogle Scholar
  33. [33] Rudin Leonid I., Osher Stanley, and Fatemi Emad. 1992. Nonlinear total variation based noise removal algorithms. Physica D: Nonlinear Phenomena 60, 1-4 (1992), 259268.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Schroff Florian, Kalenichenko Dmitry, and Philbin James. 2015. Facenet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 815823.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Stock Pierre, Shilov Igor, Mironov Ilya, and Sablayrolles Alexandre. 2022. Defending against reconstruction attacks with R\(\backslash\)’enyi differential privacy. arXiv:2202.07623 (2022). Retrieved from https://arxiv.org/abs/2202.07623.Google ScholarGoogle Scholar
  36. [36] Dmitry Ulyanov, Vadim Lebedev, Andrea Vedaldi, and Victor Lempitsky. 2016. Texture networks: feed-forward synthesis of textures and stylized images. In Proceedings of the 33rd International Conference on International Conference on Machine Learning (ICML’16). 48 (2016) 13491357.Google ScholarGoogle Scholar
  37. [37] Usynin Dmitrii, Rueckert Daniel, Passerat-Palmbach Jonathan, and Kaissis Georgios. 2022. Zen and the art of model adaptation: Low-utility-cost attack mitigations in collaborative machine learning. Proceedings on Privacy Enhancing Technologies 2022, 1 (2022), 274290.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Usynin Dmitrii, Ziller Alexander, Makowski Marcus, Braren Rickmer, Rueckert Daniel, Glocker Ben, Kaissis Georgios, and Passerat-Palmbach Jonathan. 2021. Adversarial interference and its mitigations in privacy-preserving collaborative machine learning. Nature Machine Intelligence 3, 9 (2021), 749758.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Verbraeken Joost, Wolting Matthijs, Katzy Jonathan, Kloppenburg Jeroen, Verbelen Tim, and Rellermeyer Jan S. 2020. A survey on distributed machine learning. ACM Computing Surveys (CSUR) 53, 2 (2020), 133.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] Xie Chulin, Huang Keli, Chen Pin-Yu, and Li Bo. 2019. Dba: Distributed backdoor attacks against federated learning. In Proceedings of the International Conference on Learning Representations.Google ScholarGoogle Scholar
  41. [41] Xu Yuan, Wang Yuxin, Yuan Jie, Cheng Qian, Wang Xueding, and Carson Paul L.. 2019. Medical breast ultrasound image segmentation by machine learning. Ultrasonics 91 (2019), 19.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Yin Hongxu, Mallya Arun, Vahdat Arash, Alvarez Jose M., Kautz Jan, and Molchanov Pavlo. 2021. See through Gradients: Image batch recovery via GradInversion. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 1633716346.Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] Jason Yosinski, Jeff Clune, Anh Nguyen, Thomas Fuchs, and Hod Lipson. 2015. Understanding neural networks through deep visualization. In ICML Workshop on Deep Learning (2015).Google ScholarGoogle Scholar
  44. [44] Chiyuan Zhang, Samy Bengio, and Yoram Singer. 2022. Are All Layers Created Equal? Journal of Machine Learning Research 23, 67 (2022), 128.Google ScholarGoogle Scholar
  45. [45] Zhang Yuheng, Jia Ruoxi, Pei Hengzhi, Wang Wenxiao, Li Bo, and Song Dawn. 2020. The secret revealer: Generative model-inversion attacks against deep neural networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 253261.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Zhao Bo, Mopuri Konda Reddy, and Bilen Hakan. 2020. idlg: Improved deep leakage from gradients. arXiv:2001.02610 (2020). Retrieved from https://arxiv.org/abs/2001.02610.Google ScholarGoogle Scholar
  47. [47] Zhu Ligeng and Han Song. 2020. Deep leakage from gradients. In Federated Learning. Springer, 1731.Google ScholarGoogle ScholarCross RefCross Ref
  48. [48] Ziller Alexander, Usynin Dmitrii, Remerscheid Nicolas, Knolle Moritz, Makowski Marcus, Braren Rickmer, Rueckert Daniel, and Kaissis Georgios. 2021. Differentially private federated deep learning for multi-site medical image segmentation. arXiv:2107.02586 (2021). Retrieved from https://arxiv.org/abs/2107.02586.Google ScholarGoogle Scholar

Index Terms

  1. Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Privacy and Security
        ACM Transactions on Privacy and Security  Volume 26, Issue 3
        August 2023
        640 pages
        ISSN:2471-2566
        EISSN:2471-2574
        DOI:10.1145/3582895
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 June 2023
        • Online AM: 24 April 2023
        • Accepted: 7 March 2023
        • Revised: 3 November 2022
        • Received: 13 July 2022
        Published in tops Volume 26, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)409
        • Downloads (Last 6 weeks)35

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text