GAN-Based Domain Inference Attack
نویسندگان
چکیده
Model-based attacks can infer training data information from deep neural network models. These heavily depend on the attacker's knowledge of application domain, e.g., using it to determine auxiliary for model-inversion attacks. However, attackers may not know what model is used in practice. We propose a generative adversarial (GAN) based method explore likely or similar domains target -- domain inference (MDI) attack. For given (classification) model, we assume that attacker knows nothing but input and output formats use derive prediction any desired form. Our basic idea affect GAN process candidate domain's dataset easy obtain. find distort procedure less if more domain. then measure distortion level with distance between GAN-generated datasets, which be rank model. experiments show an MDI top-ranked effectively boost result
منابع مشابه
On the Practicality of Motion Based Keystroke Inference Attack
Recent researches have shown that motion sensors may be used as a side channel to infer keystrokes on the touchscreen of smartphones. However, the practicality of this attack is unclear. For example, does this attack work on different devices, screen dimensions, keyboard layouts, or keyboard types? Does this attack depend on specific users or is it user independent? To answer these questions, w...
متن کاملUnit-Selection Attack Detection Based on Unfiltered Frequency-Domain Features
Modern text-to-speech algorithms pose a vital threat to the security of speaker identification and verification (SIV) systems, in terms of subversive usage, i.e. generating presentation attacks. In order to distinguish between presentation attacks and bona fide authentication attempts, presentation attack detection (PAD) subsystems are of utmost importance. Until now, the vast majority of intro...
متن کاملInference and Attack in Bayesian Networks
In legal reasoning the Bayesian network approach has gained increasingly more attention over the last years due to the increase in scientific forensic evidence. It can however be questioned how meaningful a Bayesian network is in terms that are easily comprehensible by judges and lawyers. Argumentation models, which represent arguments and defeat, are arguably closer to their natural way of arg...
متن کاملDistributed Inference to Detect a Network Attack
We consider the problem of identifying a network attack that provides evidence of its existence through the presence of weak, distributed information. One example of weak distributed information, discussed by Jung et al. [2004] and Weaver et al. [2004], occurs during a scanning worm’s reconnaissance phase, where several hosts in a network may be able to pick up a signal which alone does not loo...
متن کاملCross-Domain Scruffy Inference
Reasoning about Commonsense knowledge poses many problems that traditional logical inference doesn’t handle well. Among these is cross-domain inference: how to draw on multiple independently produced knowledge bases. Since knowledge bases may not have the same vocabulary, level of detail, or accuracy, that inference should be “scruffy.” The AnalogySpace technique showed that a factored inferenc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the ... AAAI Conference on Artificial Intelligence
سال: 2023
ISSN: ['2159-5399', '2374-3468']
DOI: https://doi.org/10.1609/aaai.v37i12.26663