论文标题

通过神经元排他性分析探索数据重建的安全边界

Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis

论文作者

Pan, Xudong, Zhang, Mi, Yan, Yifan, Zhu, Jiaming, Yang, Min

论文摘要

在对神经网络梯度的现有隐私攻击中,\ emph {数据重建攻击},该攻击反向工程培训批次从梯度上进行了反向,对私人培训数据构成了严重的威胁。尽管在大型体系结构和小型培训批次上取得了经验成功,但当较小的体系结构或较大的批次受到攻击时,也观察到不稳定的重建精度。由于现有基于学习的攻击的解释性较弱,因此关于数据重建攻击的原因,何时以及如何可行,鲜为人知。 在我们的工作中,我们通过对具有整流线性单元(RELUS)的神经网络的微观视图进行了有关数据重建的安全边界的首次分析研究,这是实践中最流行的激活函数。第一次,我们以\ emph {emph {emph {emph {\ emph {\ textbf {ex ex} clusively \ clusively \ extbf {a} ctivate \ textbf {exant imiviation I.在一批中)。从直觉上讲,我们显示了一个带有更多EXAN的培训批次更容易受到数据重建攻击的影响,反之亦然。一方面,我们构建了一种新颖的确定性攻击算法,该算法大大优于以前的攻击,用于重建位于神经网络不安全边界的训练批次。同时,对于位于安全边界中的训练批次,我们证明了不可能进行独特的重建,基于该批次,根据该培训策略,为缓解目的而设计了排他性降低策略以扩大安全边界。

Among existing privacy attacks on the gradient of neural networks, \emph{data reconstruction attack}, which reverse engineers the training batch from the gradient, poses a severe threat on the private training data. Despite its empirical success on large architectures and small training batches, unstable reconstruction accuracy is also observed when a smaller architecture or a larger batch is under attack. Due to the weak interpretability of existing learning-based attacks, there is little known on why, when and how data reconstruction attack is feasible. In our work, we perform the first analytic study on the security boundary of data reconstruction from gradient via a microcosmic view on neural networks with rectified linear units (ReLUs), the most popular activation function in practice. For the first time, we characterize the insecure/secure boundary of data reconstruction attack in terms of the \emph{neuron exclusivity state} of a training batch, indexed by the number of \emph{\textbf{Ex}clusively \textbf{A}ctivated \textbf{N}eurons} (ExANs, i.e., a ReLU activated by only one sample in a batch). Intuitively, we show a training batch with more ExANs are more vulnerable to data reconstruction attack and vice versa. On the one hand, we construct a novel deterministic attack algorithm which substantially outperforms previous attacks for reconstructing training batches lying in the insecure boundary of a neural network. Meanwhile, for training batches lying in the secure boundary, we prove the impossibility of unique reconstruction, based on which an exclusivity reduction strategy is devised to enlarge the secure boundary for mitigation purposes.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源