Skip to main content

Showing 1–10 of 10 results for author: Cherubin, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.14397  [pdf, other

    cs.CR cs.LG

    Closed-Form Bounds for DP-SGD against Record-level Inference

    Authors: Giovanni Cherubin, Boris Köpf, Andrew Paverd, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin

    Abstract: Machine learning models trained with differentially-private (DP) algorithms such as DP-SGD enjoy resilience against a wide range of privacy attacks. Although it is possible to derive bounds for some attacks based solely on an $(\varepsilon,δ)$-DP guarantee, meaningful bounds require a small enough privacy budget (i.e., injecting a large amount of noise), which results in a large loss in utility. T… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

  2. arXiv:2212.10986  [pdf, other

    cs.LG cs.CR cs.GT

    SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning

    Authors: Ahmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella-Béguelin

    Abstract: Deploying machine learning models in production may allow adversaries to infer sensitive information about training data. There is a vast literature analyzing different types of inference risks, ranging from membership inference to reconstruction attacks. Inspired by the success of games (i.e., probabilistic experiments) to study security properties in cryptography, some authors describe privacy i… ▽ More

    Submitted 20 April, 2023; v1 submitted 21 December, 2022; originally announced December 2022.

    Comments: 20 pages, to appear in 2023 IEEE Symposium on Security and Privacy

  3. arXiv:2205.03257  [pdf, other

    cs.LG

    Synthetic Data -- what, why and how?

    Authors: James Jordon, Lukasz Szpruch, Florimond Houssiau, Mirko Bottarelli, Giovanni Cherubin, Carsten Maple, Samuel N. Cohen, Adrian Weller

    Abstract: This explainer document aims to provide an overview of the current state of the rapidly expanding work on synthetic data technologies, with a particular focus on privacy. The article is intended for a non-technical audience, though some formal definitions have been given to provide clarity to specialists. This article is intended to enable the reader to quickly become familiar with the notion of s… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

    Comments: Commissioned by the Royal Society. 57 pages 2 figures

  4. arXiv:2202.01315  [pdf, other

    cs.LG stat.AP

    Approximating Full Conformal Prediction at Scale via Influence Functions

    Authors: Javier Abad, Umang Bhatt, Adrian Weller, Giovanni Cherubin

    Abstract: Conformal prediction (CP) is a wrapper around traditional machine learning models, giving coverage guarantees under the sole assumption of exchangeability; in classification problems, for a chosen significance level $\varepsilon$, CP guarantees that the error rate is at most $\varepsilon$, irrespective of whether the underlying model is misspecified. However, the prohibitive computational costs of… ▽ More

    Submitted 22 February, 2023; v1 submitted 2 February, 2022; originally announced February 2022.

    Comments: 18 pages, 13 figures

  5. arXiv:2201.04845  [pdf, other

    cs.CR cs.LG

    Reconstructing Training Data with Informed Adversaries

    Authors: Borja Balle, Giovanni Cherubin, Jamie Hayes

    Abstract: Given access to a machine learning model, can an adversary reconstruct the model's training data? This work studies this question from the lens of a powerful informed adversary who knows all the training data points except one. By instantiating concrete attacks, we show it is feasible to reconstruct the remaining data point in this stringent threat model. For convex models (e.g. logistic regressio… ▽ More

    Submitted 25 April, 2022; v1 submitted 13 January, 2022; originally announced January 2022.

    Comments: Published at "2022 IEEE Symposium on Security and Privacy (SP)"

  6. arXiv:2102.03236  [pdf, other

    cs.LG math.OC

    Exact Optimization of Conformal Predictors via Incremental and Decremental Learning

    Authors: Giovanni Cherubin, Konstantinos Chatzikokolakis, Martin Jaggi

    Abstract: Conformal Predictors (CP) are wrappers around ML models, providing error guarantees under weak assumptions on the data distribution. They are suitable for a wide range of problems, from classification and regression to anomaly detection. Unfortunately, their very high computational complexity limits their applicability to large datasets. In this work, we show that it is possible to speed up a CP c… ▽ More

    Submitted 5 October, 2021; v1 submitted 5 February, 2021; originally announced February 2021.

  7. Bayes Security: A Not So Average Metric

    Authors: Konstantinos Chatzikokolakis, Giovanni Cherubin, Catuscia Palamidessi, Carmela Troncoso

    Abstract: Security system designers favor worst-case security metrics, such as those derived from differential privacy (DP), due to the strong guarantees they provide. On the downside, these guarantees result in a high penalty on the system's performance. In this paper, we study Bayes security, a security metric inspired by the cryptographic advantage. Similarly to DP, Bayes security i) is independent of an… ▽ More

    Submitted 20 February, 2024; v1 submitted 6 November, 2020; originally announced November 2020.

  8. arXiv:1906.00389  [pdf, other

    cs.LG cs.CR cs.CY stat.ML

    Disparate Vulnerability to Membership Inference Attacks

    Authors: Bogdan Kulynych, Mohammad Yaghini, Giovanni Cherubin, Michael Veale, Carmela Troncoso

    Abstract: A membership inference attack (MIA) against a machine-learning model enables an attacker to determine whether a given data record was part of the model's training data or not. In this paper, we provide an in-depth study of the phenomenon of disparate vulnerability against MIAs: unequal success rate of MIAs against different population subgroups. We first establish necessary and sufficient conditio… ▽ More

    Submitted 16 September, 2021; v1 submitted 2 June, 2019; originally announced June 2019.

    Comments: To appear in Privacy-Enhancing Technologies Symposium (PETS) 2022. This version has an updated authors list

  9. F-BLEAU: Fast Black-box Leakage Estimation

    Authors: Giovanni Cherubin, Konstantinos Chatzikokolakis, Catuscia Palamidessi

    Abstract: We consider the problem of measuring how much a system reveals about its secret inputs. We work under the black-box setting: we assume no prior knowledge of the system's internals, and we run the system for choices of secrets and measure its leakage from the respective outputs. Our goal is to estimate the Bayes risk, from which one can derive some of the most popular leakage measures (e.g., min-en… ▽ More

    Submitted 27 October, 2020; v1 submitted 4 February, 2019; originally announced February 2019.

    Journal ref: In 2019 IEEE Symposium on Security and Privacy (SP), pp. 835-852. IEEE, 2019

  10. Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

    Authors: Giovanni Cherubin

    Abstract: Website Fingerprinting (WF) attacks raise major concerns about users' privacy. They employ Machine Learning (ML) to allow a local passive adversary to uncover the Web browsing behavior of a user, even if she browses through an encrypted tunnel (e.g. Tor, VPN). Numerous defenses have been proposed in the past; however, it is typically difficult to have formal guarantees on their security, which is… ▽ More

    Submitted 23 August, 2017; v1 submitted 24 February, 2017; originally announced February 2017.