Feb. 16, 2024, 5:10 a.m. | Achraf Azize, Debabrota Basu

cs.CR updates on arXiv.org arxiv.org

arXiv:2402.10065v1 Announce Type: cross
Abstract: We study the per-datum Membership Inference Attacks (MIAs), where an attacker aims to infer whether a fixed target datum has been included in the input dataset of an algorithm and thus, violates privacy. First, we define the membership leakage of a datum as the advantage of the optimal adversary targeting to identify it. Then, we quantify the per-datum membership leakage for the empirical mean, and show that it depends on the Mahalanobis distance between the …

algorithm arxiv attacker attacks cs.cr cs.lg dataset input leak math.st privacy stat.ml stat.th study target

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Penetration Tester, Retail Engineering, Early Career

@ Apple | Austin, Texas, United States

Principal Product Security Engineer

@ Palo Alto Networks | Bengaluru, India

Senior Manager/ Director, Cyber

@ McGrathNicol | Brisbane