Privacy in Machine Learning
Fatemehsadat Mireshghallah WiMLDS NeurIPS19 Meet-up
Privacy in Machine Learning Fatemehsadat Mireshghallah WiMLDS - - PowerPoint PPT Presentation
Privacy in Machine Learning Fatemehsadat Mireshghallah WiMLDS NeurIPS19 Meet-up Why is privacy a concern in ML? Patient History Genetic Data Search History Famous incidents - Anonymization - A Face Is Exposed for AOL Searcher No.
Fatemehsadat Mireshghallah WiMLDS NeurIPS19 Meet-up
Patient History Genetic Data Search History
4417749” [Barbaro & Zeller ’06]
Datasets (How to Break Anonymity of the Netflix Prize Dataset)”[Narayanan & Shmatikov ’08]
Records in Washington State Data” [Sweeney ’13]
Membership Inference Attacks Against Machine Learning Models [Shokri’17] Practical Black-Box Attacks against Machine Learning [Papernot’17] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [Fredrikson’15]
https://1.bp.blogspot.com/-K65Ed68KGXk/WOa9jaRWC6I/AAAAAAAABsM/gglycD_anuQSp-i67fxER1FOlVTulvV2gCLcB/s640/ FederatedLearning_FinalFiles_Flow%2BChart1.png
Inverting Visual Representations with Convolutional Networks [Dosovitskiy’16]
Privacy Accuracy Loss
C
p u t a t i
a l C
t
~ ~
Shredder
Undesirable Region Accuracy-Agnostic Noise Addition Homomorphic Encryption
CryptoNets[19] Minion[21]
… … …
✕
Edge Cloud
L(x, θ1) R(a0, θ2)
Activation
Noisy Activation
y = f 0(x, θ, n)
input x a a0
Noise Tensor
+
n2
<latexit sha1_base64="2gC/EUzsrfM2WwF/0jswBTB1Ta4=">AB6nicdVDJSgNBEK2JW4xb1KOXxiB4Gnqy4OQW9OIxolkgCaGn0ma9PQM3T1CGPIJXjwo4tUv8ubf2FkEFX1Q8Hiviqp6QSy4Nh/OJm19Y3Nrex2bmd3b/8gf3jU1FGiKGvQSESqHRDNBJesYbgRrB0rRsJAsFYwuZr7rXumNI/knZnGrBeSkeRDTomx0q3sF/v5AnZxseqXSwi7xXLVr/iWVHDJr3rIc/ECBVih3s+/dwcRTUImDRVE646HY9NLiTKcCjbLdRPNYkInZMQ6lkoSMt1LF6fO0JlVBmgYKVvSoIX6fSIlodbTMLCdITFj/dubi395ncQM/V7KZwYJuly0TARyERo/jcacMWoEVNLCFXc3oromChCjU0nZ0P4+hT9T5pF18Oud1Mu1C5XcWThBE7hHDy4gBpcQx0aQGED/AEz45wHp0X53XZmnFWM8fwA87bJ30je8=</latexit><latexit sha1_base64="2gC/EUzsrfM2WwF/0jswBTB1Ta4=">AB6nicdVDJSgNBEK2JW4xb1KOXxiB4Gnqy4OQW9OIxolkgCaGn0ma9PQM3T1CGPIJXjwo4tUv8ubf2FkEFX1Q8Hiviqp6QSy4Nh/OJm19Y3Nrex2bmd3b/8gf3jU1FGiKGvQSESqHRDNBJesYbgRrB0rRsJAsFYwuZr7rXumNI/knZnGrBeSkeRDTomx0q3sF/v5AnZxseqXSwi7xXLVr/iWVHDJr3rIc/ECBVih3s+/dwcRTUImDRVE646HY9NLiTKcCjbLdRPNYkInZMQ6lkoSMt1LF6fO0JlVBmgYKVvSoIX6fSIlodbTMLCdITFj/dubi395ncQM/V7KZwYJuly0TARyERo/jcacMWoEVNLCFXc3oromChCjU0nZ0P4+hT9T5pF18Oud1Mu1C5XcWThBE7hHDy4gBpcQx0aQGED/AEz45wHp0X53XZmnFWM8fwA87bJ30je8=</latexit><latexit sha1_base64="2gC/EUzsrfM2WwF/0jswBTB1Ta4=">AB6nicdVDJSgNBEK2JW4xb1KOXxiB4Gnqy4OQW9OIxolkgCaGn0ma9PQM3T1CGPIJXjwo4tUv8ubf2FkEFX1Q8Hiviqp6QSy4Nh/OJm19Y3Nrex2bmd3b/8gf3jU1FGiKGvQSESqHRDNBJesYbgRrB0rRsJAsFYwuZr7rXumNI/knZnGrBeSkeRDTomx0q3sF/v5AnZxseqXSwi7xXLVr/iWVHDJr3rIc/ECBVih3s+/dwcRTUImDRVE646HY9NLiTKcCjbLdRPNYkInZMQ6lkoSMt1LF6fO0JlVBmgYKVvSoIX6fSIlodbTMLCdITFj/dubi395ncQM/V7KZwYJuly0TARyERo/jcacMWoEVNLCFXc3oromChCjU0nZ0P4+hT9T5pF18Oud1Mu1C5XcWThBE7hHDy4gBpcQx0aQGED/AEz45wHp0X53XZmnFWM8fwA87bJ30je8=</latexit><latexit sha1_base64="2gC/EUzsrfM2WwF/0jswBTB1Ta4=">AB6nicdVDJSgNBEK2JW4xb1KOXxiB4Gnqy4OQW9OIxolkgCaGn0ma9PQM3T1CGPIJXjwo4tUv8ubf2FkEFX1Q8Hiviqp6QSy4Nh/OJm19Y3Nrex2bmd3b/8gf3jU1FGiKGvQSESqHRDNBJesYbgRrB0rRsJAsFYwuZr7rXumNI/knZnGrBeSkeRDTomx0q3sF/v5AnZxseqXSwi7xXLVr/iWVHDJr3rIc/ECBVih3s+/dwcRTUImDRVE646HY9NLiTKcCjbLdRPNYkInZMQ6lkoSMt1LF6fO0JlVBmgYKVvSoIX6fSIlodbTMLCdITFj/dubi395ncQM/V7KZwYJuly0TARyERo/jcacMWoEVNLCFXc3oromChCjU0nZ0P4+hT9T5pF18Oud1Mu1C5XcWThBE7hHDy4gBpcQx0aQGED/AEz45wHp0X53XZmnFWM8fwA87bJ30je8=</latexit>Noise Tensor
n1
<latexit sha1_base64="TbOVm4a1bj7EWv2q2BG16ZUEIEA=">AB6nicbVBNS8NAEJ3Ur1q/oh69LBbBU0lE0GPRi8eK9gPaUDbSbt0swm7G6GE/gQvHhTx6i/y5r9x2+agrQ8GHu/NMDMvTAXxvO+ndLa+sbmVnm7srO7t3/gHh61dJIphk2WiER1QqpRcIlNw43ATqQxqHAdji+nfntJ1SaJ/LRTFIMYjqUPOKMGis9yL7fd6tezZuDrBK/IFUo0Oi7X71BwrIYpWGCat31vdQEOVWGM4HTSi/TmFI2pkPsWipjDrI56dOyZlVBiRKlC1pyFz9PZHTWOtJHNrOmJqRXvZm4n9eNzPRdZBzmWYGJVsijJBTEJmf5MBV8iMmFhCmeL2VsJGVFmbDoVG4K/PIqaV3UfK/m319W6zdFHGU4gVM4Bx+uoA530IAmMBjCM7zCmyOcF+fd+Vi0lpxi5hj+wPn8AfxljZY=</latexit><latexit sha1_base64="TbOVm4a1bj7EWv2q2BG16ZUEIEA=">AB6nicbVBNS8NAEJ3Ur1q/oh69LBbBU0lE0GPRi8eK9gPaUDbSbt0swm7G6GE/gQvHhTx6i/y5r9x2+agrQ8GHu/NMDMvTAXxvO+ndLa+sbmVnm7srO7t3/gHh61dJIphk2WiER1QqpRcIlNw43ATqQxqHAdji+nfntJ1SaJ/LRTFIMYjqUPOKMGis9yL7fd6tezZuDrBK/IFUo0Oi7X71BwrIYpWGCat31vdQEOVWGM4HTSi/TmFI2pkPsWipjDrI56dOyZlVBiRKlC1pyFz9PZHTWOtJHNrOmJqRXvZm4n9eNzPRdZBzmWYGJVsijJBTEJmf5MBV8iMmFhCmeL2VsJGVFmbDoVG4K/PIqaV3UfK/m319W6zdFHGU4gVM4Bx+uoA530IAmMBjCM7zCmyOcF+fd+Vi0lpxi5hj+wPn8AfxljZY=</latexit><latexit sha1_base64="TbOVm4a1bj7EWv2q2BG16ZUEIEA=">AB6nicbVBNS8NAEJ3Ur1q/oh69LBbBU0lE0GPRi8eK9gPaUDbSbt0swm7G6GE/gQvHhTx6i/y5r9x2+agrQ8GHu/NMDMvTAXxvO+ndLa+sbmVnm7srO7t3/gHh61dJIphk2WiER1QqpRcIlNw43ATqQxqHAdji+nfntJ1SaJ/LRTFIMYjqUPOKMGis9yL7fd6tezZuDrBK/IFUo0Oi7X71BwrIYpWGCat31vdQEOVWGM4HTSi/TmFI2pkPsWipjDrI56dOyZlVBiRKlC1pyFz9PZHTWOtJHNrOmJqRXvZm4n9eNzPRdZBzmWYGJVsijJBTEJmf5MBV8iMmFhCmeL2VsJGVFmbDoVG4K/PIqaV3UfK/m319W6zdFHGU4gVM4Bx+uoA530IAmMBjCM7zCmyOcF+fd+Vi0lpxi5hj+wPn8AfxljZY=</latexit><latexit sha1_base64="TbOVm4a1bj7EWv2q2BG16ZUEIEA=">AB6nicbVBNS8NAEJ3Ur1q/oh69LBbBU0lE0GPRi8eK9gPaUDbSbt0swm7G6GE/gQvHhTx6i/y5r9x2+agrQ8GHu/NMDMvTAXxvO+ndLa+sbmVnm7srO7t3/gHh61dJIphk2WiER1QqpRcIlNw43ATqQxqHAdji+nfntJ1SaJ/LRTFIMYjqUPOKMGis9yL7fd6tezZuDrBK/IFUo0Oi7X71BwrIYpWGCat31vdQEOVWGM4HTSi/TmFI2pkPsWipjDrI56dOyZlVBiRKlC1pyFz9PZHTWOtJHNrOmJqRXvZm4n9eNzPRdZBzmWYGJVsijJBTEJmf5MBV8iMmFhCmeL2VsJGVFmbDoVG4K/PIqaV3UfK/m319W6zdFHGU4gVM4Bx+uoA530IAmMBjCM7zCmyOcF+fd+Vi0lpxi5hj+wPn8AfxljZY=</latexit>fmireshg@ucsd.edu http://cseweb.ucsd.edu/~fmireshg/ Dec 14th (saturday) - Privacy in Machine Learning Workshop (East Meeting Rooms 8+15) -11:30 AM
Network Partitioner Intermediate Activation Adder Noisy Activation Network Output (logits) Noise Tensor Training Data Transformer with Edge Partition
5 8 8 2 3 4 1 7 3 5 8 8 2 3 4 1 7 3
Loss Input Generator with Cloud Partition Batch of Data From the Training Dataset Loss Function and Optimizer Calculated Gradients Noise Tensor Update Noise Tensor Initializer DNN Topology and Pretrained Weights Accuracy > Desired
Distribution Parameters and OrderNoise Tensor to Laplace Distribution Fitter Yes Yes No No
Collection of Distributions and Orders with Confidence intervalComputation and Communication Costs Desired Accuracy 1 2 3 4 5 6 7 8 9 Distribution Parameters and Order of Noise Elements Collector Distance of the Distribution and Noise Tensor < Desired
Intermediate Activation Adder Noisy Activation (to be sent) Transmission Noisy Activation (received) Classification Result Sampler Collection of Distributions and Orders Noise Tensor (Mist)
Edge
Edge Partition Cloud Partition
5 8 8 2 3 4 1 7 3 5 8 8 2 3 4 1 7 3
1 2 3 4 5
Cloud
5
Cross Entropy Loss Learn and remove private labels using only the given public labels, through self-supervision.
Shredder reduces the mutual information between the input and the communicated data and removes sensitive information through self- supervision. Shredder stabilizes privacy at a high level, while increasing accuracy of the primary task and decreasing the accuracy of the private task.
Shredder can perform well with any cutting point. Using an edge GPU, shredder can offer speed-ups.
Shredder’s privacy/accuracy trade-off on public and private labels (Primary and private task).
Comparison with Deep Private Feature Extraction (DPFE) method, which needs provide labels and modifies network weights, unlike Shredder.