CIS700: Security and Privacy of Machine Learning Prof. Ferdinando - - PowerPoint PPT Presentation

cis700 security and privacy of machine learning
SMART_READER_LITE
LIVE PREVIEW

CIS700: Security and Privacy of Machine Learning Prof. Ferdinando - - PowerPoint PPT Presentation

CIS700: Security and Privacy of Machine Learning Prof. Ferdinando Fioretto ffiorett@syr.edu Tell us your: Name (how you like to be called) Position (MS / PhD) and year Research Interests What do you expect from this


slide-1
SLIDE 1

CIS700: Security and Privacy of Machine Learning

  • Prof. Ferdinando Fioretto


ffiorett@syr.edu

slide-2
SLIDE 2

Introductions

Let us know each other

  • Name (how you like to be called)
  • Position (MS / PhD) and year
  • Research Interests
  • What do you expect from this course!

Tell us your:

slide-3
SLIDE 3

Syracuse University

3

Preliminaries

  • Syllabus: http://web.ecs.syr.edu/~ffiorett/classes/spring20.html
  • Schedule and Material (will be updated)
  • Teams (more on this later)
  • Assigned reading (will be updated)
  • Assigned reports (will be updated)
  • Grading information
  • Ethics statement
  • Class Schedule: Mon + Wed 5:15 — 6:35pm
  • Office Hours: Fri 12:30 — 1:30pm
  • Office Location: 4-125 CST
slide-4
SLIDE 4

Syracuse University

4

Slack!

  • (Couse’ we all like to slack a bit)
  • Join the Slack channel: ff-cis700-spring20.slack.com
  • Send me your email (if you have not received an invitation) at ffiorett@syr.edu with

email subject: “CIS700 Slack contact”

  • Accept the invitation (you may have already received it)
  • To be used for:
  • All form of communication with teammates, class, and me (please don’t slack me

too much)

  • All submissions: Presentation slides, reports, projects


#report-submission (for your report submissions
 #slides-submission (…)
 #paper-discussion (Q&A about papers between classmates)

slide-5
SLIDE 5

Syracuse University

5

The Team Universe

Coruscant Alderaan Yavin Kamino Onderon Mandalore Naboo

Mu Bai Cuong Tran Lin Zhang Zuhal Altundal David Castello Weiheng Chai

  • S. Dinparvar
  • M. SP Madala


?? Amin Fallahi Jindi Wu Tejas Bharambe Kunj Gosai Ankit Khare Haoyu Li Kun Wu Chenbin Pan Vedhas S Patkar Jiyang Wang Pratik A Paranjape Chirag Sachdev

Team composition
 may change slightly 
 during this week

slide-6
SLIDE 6

Syracuse University

6

What is this class about?

  • This is not an ML course!
  • Seminar-type class: we will

read lots of paper

Security Privacy

slide-7
SLIDE 7

Syracuse University

7

Class Format

  • 1h presentation of reading materials
  • Research papers or book chapters
  • One team will present and lead the discussion
  • Everyone should be reading the material ahead!
  • One team will take notes and synthesize the discussion
  • 20 min — Discussion and Q&A (but should arise during the presentation!)
  • Deadlines:
  • 2 days prior to the class: presenting team submits slides (by 11:59pm)
  • 2 days after the last class of the module: notes team submits document

(by 11:59pm)

slide-8
SLIDE 8

Syracuse University

8

Presentation Format

  • Be creative!
  • Slides are okay
  • Interactive demos are great
  • Code tutorials are great
  • Combination of the above is awesome
  • Requirements:
  • Involve the class in active discussion
  • Cover all papers assigned
  • Questions:
  • Can I use other authors’ available material? Yes — with disclaimer
slide-9
SLIDE 9

Syracuse University

9

Presentation Grading

  • Rubric: http://web.ecs.syr.edu/~ffiorett/classes/spring20/rubric.pdf
  • Technical:
  • Depth of the content
  • Accuracy of the content
  • Discussion of the paper Pro and Cons
  • Discussion Lead
  • Non-technical
  • Time management
  • Responsiveness to the audience
  • Organization
  • Presentation Format
slide-10
SLIDE 10

Syracuse University

10

Notes Format

  • Notes should be produced in LaTeX
  • Use the AAAI format (https://aaai.org/Press/Author/

authorguide.php)

  • At least 3 pages; No more than 8 pages
  • Include all references and images
slide-11
SLIDE 11

Syracuse University

11

Notes Grading

  • Reports will be evaluated based on:
  • Readability
  • Technical content
  • Accuracy of the information provided
  • Reports should be written and are graded per team
slide-12
SLIDE 12

Syracuse University

12

Lateness policy

  • Paper presentation
  • Deadline: Must be turned in by 11:59pm 2 days before the class
  • 10% per day late-penalty
  • 0 point if the presentation is not ready for the day in which the team is

supposed to present

  • Class Notes
  • Deadline: 2 days after the last class of the module: notes team

submits document (by 11:59pm)

  • 10% per day late-penalty
  • Up to a max of 4 days
slide-13
SLIDE 13

Syracuse University

13

Grading Scheme

  • 30 % paper presentation
  • 20 % class notes
  • 10 % class participation
  • 40 % research project
slide-14
SLIDE 14

Syracuse University

14

Integrity

Please take a moment to review the Code of Student conduct https://policies.syr.edu/policies/academic-rules-student- responsibilities-and-services/code-of-student-conduct/ Instances of plagiarism, copying, and other disallowed behavior will costitute a violation of the code of student conduct. Students are responsible for reporting any violation of these rules by other students, and failure to do so constitute a violation of the code of student conduct.

slide-15
SLIDE 15

Syracuse University

15

Ethics

In this course, you will be learning about and exploring some vulnerabilities that could be exploited to compromise deployed

  • systems. You are trusted to behave responsibility and ethically.

You may not attack any system without permission of its owners, and may not use anything you learn in this class for evil. If you have doubts about ethical and legal aspects of what you want to do, you should check with the course instructor before proceeding. Any activity outside the letter or spirit of these guidelines will be reported to the proper authorities and may result in dismissal from the class.

slide-16
SLIDE 16

Syracuse University

16

The ML Paradigm

Learning Hypothesis Training Data Test Data Model

Fitting Inference

Predictions

slide-17
SLIDE 17

Syracuse University

17

The ML Paradigm

Neural Networks Emails + labels (spam) Unlabeled 
 email Model

Fitting Inference

Spam?

slide-18
SLIDE 18

Syracuse University

18

The ML Paradigm in Adversarial Settings

Poisoning

Poisoning: An adversary inject bad data into the training pool (spam marked as not spam) and the model learns something it should not

Training Time Learning Hypothesis Training Data Test Data Model

Fitting Inference

Predictions

slide-19
SLIDE 19

Syracuse University

19

The ML Paradigm in Adversarial Settings

Poisoning

The most common result of a poisoning attack is that the model’s boundary shifts in some way

slide-20
SLIDE 20

Syracuse University

20

The ML Paradigm in Adversarial Settings

Evasion

Poisoning: An adversary design adversarial examples that evades detection )spam marked as good)

Production Time Learning Hypothesis Training Data Test Data Model

Fitting Inference

Predictions

slide-21
SLIDE 21

Syracuse University

21

The ML Paradigm in Adversarial Settings

Evasion

A typical example is to change some pixels in a picture before uploading, so that image recognition system fails to classify the result

slide-22
SLIDE 22

Syracuse University

22

The ML Paradigm in Adversarial Settings

Evasion

These attacks pull the poisoned example across the “fixed” boundary (instead of shifting it)

slide-23
SLIDE 23

Syracuse University

23

The ML Paradigm in Adversarial Settings

Member Inference

Membership inference: Inspect model to detect if a user was in or not in the training data

Production Time Learning Hypothesis Training Data Test Data Model

Fitting Inference

Predictions Relations with Privacy!

slide-24
SLIDE 24

Syracuse University

24

The ML Paradigm in Adversarial Settings

Model Extraction

Learning Hypothesis Training Data Test Data Model

Fitting Inference

Predictions Production Time

Model extraction: The adversary observes predictions and reconstructs the model 
 locally

slide-25
SLIDE 25

Syracuse University

25

Privacy

slide-26
SLIDE 26

Syracuse University

26

The Cost of Privacy

$3.86

slide-27
SLIDE 27

Syracuse University

27

Differential Privacy

Pr[A(D1) = O] Pr[A(D2) = O] ≤ exp(✏)

<latexit sha1_base64="dZzZ8Q5eyY9EkPgGM+TdevHts=">ACOXicdVDLSgMxFM34rPVdekmWIS6KTPVal0IvhburGBV6Awlk96pwUxmTDJiGfpbvwLd4IbF4q49QfMtBVU9EDgcM693Jzjx5wpbduP1sjo2PjEZG4qPz0zOzdfWFg8U1EiKTRoxCN54RMFnAloaKY5XMQSOhzOPevDjL/AakYpE41d0YvJB0BAsYJdpIrULdDShqVuXTck+pISnu71SoctZw3v4GOvl/Dqw97HK4xi7cxiUXYsV4JNZahaJdrlSrtc0qzsimY2/hgbK9jp2y3UcRDVFvFR7cdkSTEISmnCjVdOxYeymRmlEOvbybKIgJvSIdaBoqSAjKS/vJe3jVKG0cRNI8oXFf/b6RklCpbuibySyB+u1l4l9eM9FBzUuZiBMNg4OBQnHOsJZjbjNJFDNu4YQKpn5K6aXxFSpTdl5U8JXUvw/OauUHbvsnGwUd/eHdeTQMlpBJeSgLbSLjlAdNRBFd+gJvaBX6956t6s98HoiDXcWUI/YH18ArhMq6w=</latexit><latexit sha1_base64="dZzZ8Q5eyY9EkPgGM+TdevHts=">ACOXicdVDLSgMxFM34rPVdekmWIS6KTPVal0IvhburGBV6Awlk96pwUxmTDJiGfpbvwLd4IbF4q49QfMtBVU9EDgcM693Jzjx5wpbduP1sjo2PjEZG4qPz0zOzdfWFg8U1EiKTRoxCN54RMFnAloaKY5XMQSOhzOPevDjL/AakYpE41d0YvJB0BAsYJdpIrULdDShqVuXTck+pISnu71SoctZw3v4GOvl/Dqw97HK4xi7cxiUXYsV4JNZahaJdrlSrtc0qzsimY2/hgbK9jp2y3UcRDVFvFR7cdkSTEISmnCjVdOxYeymRmlEOvbybKIgJvSIdaBoqSAjKS/vJe3jVKG0cRNI8oXFf/b6RklCpbuibySyB+u1l4l9eM9FBzUuZiBMNg4OBQnHOsJZjbjNJFDNu4YQKpn5K6aXxFSpTdl5U8JXUvw/OauUHbvsnGwUd/eHdeTQMlpBJeSgLbSLjlAdNRBFd+gJvaBX6956t6s98HoiDXcWUI/YH18ArhMq6w=</latexit><latexit sha1_base64="dZzZ8Q5eyY9EkPgGM+TdevHts=">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</latexit><latexit sha1_base64="dZzZ8Q5eyY9EkPgGM+TdevHts=">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</latexit>

Pr[A(D1) = O]

D

<latexit sha1_base64="q5OMgLB/DaE+xZ1rk3eY+oB96xE=">AB6HicdVDLSgNBEJyNrxhfUY9eBoPgadmN5uEtEA8eEzAPSJYwO+lNxszOLjOzQgj5Ai8eFPHqJ3nzb5xNIqhoQUNR1U13lx9zprTjfFiZtfWNza3sdm5nd2/IH941FZRIim0aMQj2fWJAs4EtDTHLqxBL6HDr+pJ76nXuQikXiVk9j8EIyEixglGgjNa8H+YJjF0ularmEU1J2nQpeKlcX2LWdBQpohcYg/94fRjQJQWjKiVI914m1NyNSM8phnusnCmJCJ2QEPUMFCUF5s8Whc3xmlCEOImlKaLxQv0/MSKjUNPRNZ0j0WP32UvEvr5foOrNmIgTDYIuFwUJxzrC6d4yCRQzaeGECqZuRXTMZGEapNzoTw9Sn+n7SLtuvYbvOyUKuv4siE3SKzpGLKqiGblADtRBFgB7QE3q27qxH68V6XbZmrNXMfoB6+0TETeNHQ=</latexit><latexit sha1_base64="q5OMgLB/DaE+xZ1rk3eY+oB96xE=">AB6HicdVDLSgNBEJyNrxhfUY9eBoPgadmN5uEtEA8eEzAPSJYwO+lNxszOLjOzQgj5Ai8eFPHqJ3nzb5xNIqhoQUNR1U13lx9zprTjfFiZtfWNza3sdm5nd2/IH941FZRIim0aMQj2fWJAs4EtDTHLqxBL6HDr+pJ76nXuQikXiVk9j8EIyEixglGgjNa8H+YJjF0ularmEU1J2nQpeKlcX2LWdBQpohcYg/94fRjQJQWjKiVI914m1NyNSM8phnusnCmJCJ2QEPUMFCUF5s8Whc3xmlCEOImlKaLxQv0/MSKjUNPRNZ0j0WP32UvEvr5foOrNmIgTDYIuFwUJxzrC6d4yCRQzaeGECqZuRXTMZGEapNzoTw9Sn+n7SLtuvYbvOyUKuv4siE3SKzpGLKqiGblADtRBFgB7QE3q27qxH68V6XbZmrNXMfoB6+0TETeNHQ=</latexit><latexit sha1_base64="q5OMgLB/DaE+xZ1rk3eY+oB96xE=">AB6HicdVDLSgNBEJyNrxhfUY9eBoPgadmN5uEtEA8eEzAPSJYwO+lNxszOLjOzQgj5Ai8eFPHqJ3nzb5xNIqhoQUNR1U13lx9zprTjfFiZtfWNza3sdm5nd2/IH941FZRIim0aMQj2fWJAs4EtDTHLqxBL6HDr+pJ76nXuQikXiVk9j8EIyEixglGgjNa8H+YJjF0ularmEU1J2nQpeKlcX2LWdBQpohcYg/94fRjQJQWjKiVI914m1NyNSM8phnusnCmJCJ2QEPUMFCUF5s8Whc3xmlCEOImlKaLxQv0/MSKjUNPRNZ0j0WP32UvEvr5foOrNmIgTDYIuFwUJxzrC6d4yCRQzaeGECqZuRXTMZGEapNzoTw9Sn+n7SLtuvYbvOyUKuv4siE3SKzpGLKqiGblADtRBFgB7QE3q27qxH68V6XbZmrNXMfoB6+0TETeNHQ=</latexit><latexit sha1_base64="q5OMgLB/DaE+xZ1rk3eY+oB96xE=">AB6HicdVDLSgNBEJyNrxhfUY9eBoPgadmN5uEtEA8eEzAPSJYwO+lNxszOLjOzQgj5Ai8eFPHqJ3nzb5xNIqhoQUNR1U13lx9zprTjfFiZtfWNza3sdm5nd2/IH941FZRIim0aMQj2fWJAs4EtDTHLqxBL6HDr+pJ76nXuQikXiVk9j8EIyEixglGgjNa8H+YJjF0ularmEU1J2nQpeKlcX2LWdBQpohcYg/94fRjQJQWjKiVI914m1NyNSM8phnusnCmJCJ2QEPUMFCUF5s8Whc3xmlCEOImlKaLxQv0/MSKjUNPRNZ0j0WP32UvEvr5foOrNmIgTDYIuFwUJxzrC6d4yCRQzaeGECqZuRXTMZGEapNzoTw9Sn+n7SLtuvYbvOyUKuv4siE3SKzpGLKqiGblADtRBFgB7QE3q27qxH68V6XbZmrNXMfoB6+0TETeNHQ=</latexit>

1

A(D)

<latexit sha1_base64="MnB1CuBLf0m8OZXrVNtjZazVeh4=">AB9XicdVDLSgMxFL1TX7W+qi7dBItQN8NMtQ93lbpwWcG2QjuWTJpQzMPkoxShv6HGxeKuPVf3Pk3ZtoKnogcDjnXu7JcSPOpLKsDyOztLyupZdz21sbm3v5Hf32jKMBaEtEvJQ3LhYUs4C2lJMcXoTCYp9l9O26kfueOCsnC4FpNIur4eBgwjxGstHTb87EaEcyT82nx4rifL1hmqVyuVcoJRXbqK5cnaCbNOaoQALNPv594gJLFPA0U4lrJrW5FyEiwUI5xOc71Y0giTMR7SrqYB9ql0klnqKTrSygB5odAvUGimft9IsC/lxHf1ZJpS/vZS8S+vGyuv5iQsiGJFAzI/5MUcqRClFaABE5QoPtE8F0VkRGWGCidFE5XcLXT9H/pF0ybcu0r04L9caijiwcwCEUwYq1OESmtACAgIe4AmejXvj0XgxXuejGWOxsw8/YLx9AkjOkl8=</latexit><latexit sha1_base64="MnB1CuBLf0m8OZXrVNtjZazVeh4=">AB9XicdVDLSgMxFL1TX7W+qi7dBItQN8NMtQ93lbpwWcG2QjuWTJpQzMPkoxShv6HGxeKuPVf3Pk3ZtoKnogcDjnXu7JcSPOpLKsDyOztLyupZdz21sbm3v5Hf32jKMBaEtEvJQ3LhYUs4C2lJMcXoTCYp9l9O26kfueOCsnC4FpNIur4eBgwjxGstHTb87EaEcyT82nx4rifL1hmqVyuVcoJRXbqK5cnaCbNOaoQALNPv594gJLFPA0U4lrJrW5FyEiwUI5xOc71Y0giTMR7SrqYB9ql0klnqKTrSygB5odAvUGimft9IsC/lxHf1ZJpS/vZS8S+vGyuv5iQsiGJFAzI/5MUcqRClFaABE5QoPtE8F0VkRGWGCidFE5XcLXT9H/pF0ybcu0r04L9caijiwcwCEUwYq1OESmtACAgIe4AmejXvj0XgxXuejGWOxsw8/YLx9AkjOkl8=</latexit><latexit sha1_base64="MnB1CuBLf0m8OZXrVNtjZazVeh4=">AB9XicdVDLSgMxFL1TX7W+qi7dBItQN8NMtQ93lbpwWcG2QjuWTJpQzMPkoxShv6HGxeKuPVf3Pk3ZtoKnogcDjnXu7JcSPOpLKsDyOztLyupZdz21sbm3v5Hf32jKMBaEtEvJQ3LhYUs4C2lJMcXoTCYp9l9O26kfueOCsnC4FpNIur4eBgwjxGstHTb87EaEcyT82nx4rifL1hmqVyuVcoJRXbqK5cnaCbNOaoQALNPv594gJLFPA0U4lrJrW5FyEiwUI5xOc71Y0giTMR7SrqYB9ql0klnqKTrSygB5odAvUGimft9IsC/lxHf1ZJpS/vZS8S+vGyuv5iQsiGJFAzI/5MUcqRClFaABE5QoPtE8F0VkRGWGCidFE5XcLXT9H/pF0ybcu0r04L9caijiwcwCEUwYq1OESmtACAgIe4AmejXvj0XgxXuejGWOxsw8/YLx9AkjOkl8=</latexit><latexit sha1_base64="MnB1CuBLf0m8OZXrVNtjZazVeh4=">AB9XicdVDLSgMxFL1TX7W+qi7dBItQN8NMtQ93lbpwWcG2QjuWTJpQzMPkoxShv6HGxeKuPVf3Pk3ZtoKnogcDjnXu7JcSPOpLKsDyOztLyupZdz21sbm3v5Hf32jKMBaEtEvJQ3LhYUs4C2lJMcXoTCYp9l9O26kfueOCsnC4FpNIur4eBgwjxGstHTb87EaEcyT82nx4rifL1hmqVyuVcoJRXbqK5cnaCbNOaoQALNPv594gJLFPA0U4lrJrW5FyEiwUI5xOc71Y0giTMR7SrqYB9ql0klnqKTrSygB5odAvUGimft9IsC/lxHf1ZJpS/vZS8S+vGyuv5iQsiGJFAzI/5MUcqRClFaABE5QoPtE8F0VkRGWGCidFE5XcLXT9H/pF0ybcu0r04L9caijiwcwCEUwYq1OESmtACAgIe4AmejXvj0XgxXuejGWOxsw8/YLx9AkjOkl8=</latexit>

1

slide-28
SLIDE 28

Syracuse University

28

Differential Privacy

Pr[A(D1) = O] Pr[A(D2) = O] ≤ exp(✏)

<latexit sha1_base64="dZzZ8Q5eyY9EkPgGM+TdevHts=">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</latexit><latexit sha1_base64="dZzZ8Q5eyY9EkPgGM+TdevHts=">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</latexit><latexit sha1_base64="dZzZ8Q5eyY9EkPgGM+TdevHts=">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</latexit><latexit sha1_base64="dZzZ8Q5eyY9EkPgGM+TdevHts=">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</latexit>

Pr[A(D1) = O] Pr[A(D2) = O]

ratio ≤ exp(✏)

D

<latexit sha1_base64="q5OMgLB/DaE+xZ1rk3eY+oB96xE=">AB6HicdVDLSgNBEJyNrxhfUY9eBoPgadmN5uEtEA8eEzAPSJYwO+lNxszOLjOzQgj5Ai8eFPHqJ3nzb5xNIqhoQUNR1U13lx9zprTjfFiZtfWNza3sdm5nd2/IH941FZRIim0aMQj2fWJAs4EtDTHLqxBL6HDr+pJ76nXuQikXiVk9j8EIyEixglGgjNa8H+YJjF0ularmEU1J2nQpeKlcX2LWdBQpohcYg/94fRjQJQWjKiVI914m1NyNSM8phnusnCmJCJ2QEPUMFCUF5s8Whc3xmlCEOImlKaLxQv0/MSKjUNPRNZ0j0WP32UvEvr5foOrNmIgTDYIuFwUJxzrC6d4yCRQzaeGECqZuRXTMZGEapNzoTw9Sn+n7SLtuvYbvOyUKuv4siE3SKzpGLKqiGblADtRBFgB7QE3q27qxH68V6XbZmrNXMfoB6+0TETeNHQ=</latexit><latexit sha1_base64="q5OMgLB/DaE+xZ1rk3eY+oB96xE=">AB6HicdVDLSgNBEJyNrxhfUY9eBoPgadmN5uEtEA8eEzAPSJYwO+lNxszOLjOzQgj5Ai8eFPHqJ3nzb5xNIqhoQUNR1U13lx9zprTjfFiZtfWNza3sdm5nd2/IH941FZRIim0aMQj2fWJAs4EtDTHLqxBL6HDr+pJ76nXuQikXiVk9j8EIyEixglGgjNa8H+YJjF0ularmEU1J2nQpeKlcX2LWdBQpohcYg/94fRjQJQWjKiVI914m1NyNSM8phnusnCmJCJ2QEPUMFCUF5s8Whc3xmlCEOImlKaLxQv0/MSKjUNPRNZ0j0WP32UvEvr5foOrNmIgTDYIuFwUJxzrC6d4yCRQzaeGECqZuRXTMZGEapNzoTw9Sn+n7SLtuvYbvOyUKuv4siE3SKzpGLKqiGblADtRBFgB7QE3q27qxH68V6XbZmrNXMfoB6+0TETeNHQ=</latexit><latexit sha1_base64="q5OMgLB/DaE+xZ1rk3eY+oB96xE=">AB6HicdVDLSgNBEJyNrxhfUY9eBoPgadmN5uEtEA8eEzAPSJYwO+lNxszOLjOzQgj5Ai8eFPHqJ3nzb5xNIqhoQUNR1U13lx9zprTjfFiZtfWNza3sdm5nd2/IH941FZRIim0aMQj2fWJAs4EtDTHLqxBL6HDr+pJ76nXuQikXiVk9j8EIyEixglGgjNa8H+YJjF0ularmEU1J2nQpeKlcX2LWdBQpohcYg/94fRjQJQWjKiVI914m1NyNSM8phnusnCmJCJ2QEPUMFCUF5s8Whc3xmlCEOImlKaLxQv0/MSKjUNPRNZ0j0WP32UvEvr5foOrNmIgTDYIuFwUJxzrC6d4yCRQzaeGECqZuRXTMZGEapNzoTw9Sn+n7SLtuvYbvOyUKuv4siE3SKzpGLKqiGblADtRBFgB7QE3q27qxH68V6XbZmrNXMfoB6+0TETeNHQ=</latexit><latexit sha1_base64="q5OMgLB/DaE+xZ1rk3eY+oB96xE=">AB6HicdVDLSgNBEJyNrxhfUY9eBoPgadmN5uEtEA8eEzAPSJYwO+lNxszOLjOzQgj5Ai8eFPHqJ3nzb5xNIqhoQUNR1U13lx9zprTjfFiZtfWNza3sdm5nd2/IH941FZRIim0aMQj2fWJAs4EtDTHLqxBL6HDr+pJ76nXuQikXiVk9j8EIyEixglGgjNa8H+YJjF0ularmEU1J2nQpeKlcX2LWdBQpohcYg/94fRjQJQWjKiVI914m1NyNSM8phnusnCmJCJ2QEPUMFCUF5s8Whc3xmlCEOImlKaLxQv0/MSKjUNPRNZ0j0WP32UvEvr5foOrNmIgTDYIuFwUJxzrC6d4yCRQzaeGECqZuRXTMZGEapNzoTw9Sn+n7SLtuvYbvOyUKuv4siE3SKzpGLKqiGblADtRBFgB7QE3q27qxH68V6XbZmrNXMfoB6+0TETeNHQ=</latexit>

ε = privacy budget

Controls the degree to which D1 and D2 can be distinguished. Small ε gives more privacy (and worse utility)

2

A(D)

<latexit sha1_base64="MnB1CuBLf0m8OZXrVNtjZazVeh4=">AB9XicdVDLSgMxFL1TX7W+qi7dBItQN8NMtQ93lbpwWcG2QjuWTJpQzMPkoxShv6HGxeKuPVf3Pk3ZtoKnogcDjnXu7JcSPOpLKsDyOztLyupZdz21sbm3v5Hf32jKMBaEtEvJQ3LhYUs4C2lJMcXoTCYp9l9O26kfueOCsnC4FpNIur4eBgwjxGstHTb87EaEcyT82nx4rifL1hmqVyuVcoJRXbqK5cnaCbNOaoQALNPv594gJLFPA0U4lrJrW5FyEiwUI5xOc71Y0giTMR7SrqYB9ql0klnqKTrSygB5odAvUGimft9IsC/lxHf1ZJpS/vZS8S+vGyuv5iQsiGJFAzI/5MUcqRClFaABE5QoPtE8F0VkRGWGCidFE5XcLXT9H/pF0ybcu0r04L9caijiwcwCEUwYq1OESmtACAgIe4AmejXvj0XgxXuejGWOxsw8/YLx9AkjOkl8=</latexit><latexit sha1_base64="MnB1CuBLf0m8OZXrVNtjZazVeh4=">AB9XicdVDLSgMxFL1TX7W+qi7dBItQN8NMtQ93lbpwWcG2QjuWTJpQzMPkoxShv6HGxeKuPVf3Pk3ZtoKnogcDjnXu7JcSPOpLKsDyOztLyupZdz21sbm3v5Hf32jKMBaEtEvJQ3LhYUs4C2lJMcXoTCYp9l9O26kfueOCsnC4FpNIur4eBgwjxGstHTb87EaEcyT82nx4rifL1hmqVyuVcoJRXbqK5cnaCbNOaoQALNPv594gJLFPA0U4lrJrW5FyEiwUI5xOc71Y0giTMR7SrqYB9ql0klnqKTrSygB5odAvUGimft9IsC/lxHf1ZJpS/vZS8S+vGyuv5iQsiGJFAzI/5MUcqRClFaABE5QoPtE8F0VkRGWGCidFE5XcLXT9H/pF0ybcu0r04L9caijiwcwCEUwYq1OESmtACAgIe4AmejXvj0XgxXuejGWOxsw8/YLx9AkjOkl8=</latexit><latexit sha1_base64="MnB1CuBLf0m8OZXrVNtjZazVeh4=">AB9XicdVDLSgMxFL1TX7W+qi7dBItQN8NMtQ93lbpwWcG2QjuWTJpQzMPkoxShv6HGxeKuPVf3Pk3ZtoKnogcDjnXu7JcSPOpLKsDyOztLyupZdz21sbm3v5Hf32jKMBaEtEvJQ3LhYUs4C2lJMcXoTCYp9l9O26kfueOCsnC4FpNIur4eBgwjxGstHTb87EaEcyT82nx4rifL1hmqVyuVcoJRXbqK5cnaCbNOaoQALNPv594gJLFPA0U4lrJrW5FyEiwUI5xOc71Y0giTMR7SrqYB9ql0klnqKTrSygB5odAvUGimft9IsC/lxHf1ZJpS/vZS8S+vGyuv5iQsiGJFAzI/5MUcqRClFaABE5QoPtE8F0VkRGWGCidFE5XcLXT9H/pF0ybcu0r04L9caijiwcwCEUwYq1OESmtACAgIe4AmejXvj0XgxXuejGWOxsw8/YLx9AkjOkl8=</latexit><latexit sha1_base64="MnB1CuBLf0m8OZXrVNtjZazVeh4=">AB9XicdVDLSgMxFL1TX7W+qi7dBItQN8NMtQ93lbpwWcG2QjuWTJpQzMPkoxShv6HGxeKuPVf3Pk3ZtoKnogcDjnXu7JcSPOpLKsDyOztLyupZdz21sbm3v5Hf32jKMBaEtEvJQ3LhYUs4C2lJMcXoTCYp9l9O26kfueOCsnC4FpNIur4eBgwjxGstHTb87EaEcyT82nx4rifL1hmqVyuVcoJRXbqK5cnaCbNOaoQALNPv594gJLFPA0U4lrJrW5FyEiwUI5xOc71Y0giTMR7SrqYB9ql0klnqKTrSygB5odAvUGimft9IsC/lxHf1ZJpS/vZS8S+vGyuv5iQsiGJFAzI/5MUcqRClFaABE5QoPtE8F0VkRGWGCidFE5XcLXT9H/pF0ybcu0r04L9caijiwcwCEUwYq1OESmtACAgIe4AmejXvj0XgxXuejGWOxsw8/YLx9AkjOkl8=</latexit>

2

slide-29
SLIDE 29

Syracuse University

29

Federated Learning

https://ai.googleblog.com/2017/04/federated-learning-collaborative.html

slide-30
SLIDE 30

Syracuse University

30

Fairness

Training Time Learning Hypothesis Training Data Test Data Model

Fitting Inference

Predictions

Fairness: If training data is biassed toward a subpopulation, the accuracy for the minority party suffer, at inference

slide-31
SLIDE 31

Syracuse University

31

Fairness

slide-32
SLIDE 32

Syracuse University

32

Modules

  • 1. Evasion Attacks (and defense)
  • 2. Poisoning Attacks (and

defense)

  • 3. Privacy Attacks
  • 4. Differential Privacy (DP)
  • 5. DP and ML
  • 6. DP model extensions
  • 7. ML Robustness
  • 8. Multiparty Computation
  • 9. Federated Learning

10.Fairness and Bias

slide-33
SLIDE 33

Syracuse University

33

Research Project

  • Take a look at the class topics and papers
  • Identify two ares of interest
  • Formulate a project proposal (1/2 page, due by Jan. 31)
  • Title
  • Team (optional) — at most 2 people
  • Problem
  • Methods
  • Exampels include:
  • Extended literature review on a topic
  • Implementations of attacks/defense mechanisms
  • Implementation of privacy-preserving approaches
  • If you want to work with me, this is your chance to impress me!
slide-34
SLIDE 34

Before Going

Write down your name + 2 things 
 you hope to learn in this class.