|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Security and Privacy in Machine Learning
If you have a question about this talk, please contact Alastair Beresford.
There is growing recognition that machine learning exposes new security and privacy issues in software systems. In this talk, we first articulate a comprehensive threat model for machine learning, then present an attack against model prediction integrity, and finally discuss a framework for learning privately.
Machine learning models were shown to be vulnerable to adversarial examples—subtly modified malicious inputs crafted to compromise the integrity of their outputs. Furthermore, adversarial examples that affect one model often affect another model, even if the two models have different architectures, so long as both models were trained to perform the same task. An attacker may therefore conduct an attack with very little information about the victim by training their own substitute model to craft adversarial examples, and then transferring them to a victim model. The attacker need not even collect a training set to mount the attack. Indeed, we demonstrate how adversaries may use the victim model as an oracle to label a synthetic training set for the substitute. We conclude this first part of the talk by formally showing that there are (possibly unavoidable) tensions between model complexity, accuracy, and resilience that must be calibrated for the environments in which they will be used.
In addition, some machine learning applications involve training data that is sensitive, such as the medical histories of patients in a clinical trial. A model may inadvertently and implicitly store some of its training data; careful analysis of the model may therefore reveal sensitive information. To address this problem, we demonstrate a generally applicable approach to providing strong privacy guarantees for training data. The approach combines, in a black-box fashion, multiple models trained with disjoint datasets, such as records from different subsets of users. Because they rely directly on sensitive data, these models are not published, but instead used as “teachers” for a “student” model. The student learns to predict an output chosen by noisy voting among all of the teachers, and cannot directly access an individual teacher or the underlying data or parameters. The student’s privacy properties can be understood both intuitively (since no single teacher and thus no single dataset dictates the student’s training) and formally, in terms of differential privacy.
This talk is part of the Computer Laboratory Digital Technology Group (DTG) Meetings series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsMonday Mechanics Seminars (DAMTP) C P Snow Networking Event - Cambridge Social Ventures
Other talksResearch Data Management: Workshop (For GSLS PhD students) Helminth-induced suppression of inflammation – a role for the gut microbiota? Graphene For Satellites Thermal Control 'What's cooking? Investigating Indus Civilisation cooking practices using residue analysis' men need help too 'I have sought to serve German art with all my strength': Impressionism and Foreign Cultural Policy in Weimar Germany, 1918-1933