Privacy in Machine Learning Fatemehsadat Mireshghallah WiMLDS - - PowerPoint PPT Presentation

privacy in machine learning
SMART_READER_LITE
LIVE PREVIEW

Privacy in Machine Learning Fatemehsadat Mireshghallah WiMLDS - - PowerPoint PPT Presentation

Privacy in Machine Learning Fatemehsadat Mireshghallah WiMLDS NeurIPS19 Meet-up Why is privacy a concern in ML? Patient History Genetic Data Search History Famous incidents - Anonymization - A Face Is Exposed for AOL Searcher No.


slide-1
SLIDE 1

Privacy in Machine Learning

Fatemehsadat Mireshghallah WiMLDS NeurIPS19 Meet-up

slide-2
SLIDE 2

Why is privacy a concern in ML?

Patient History Genetic Data Search History

slide-3
SLIDE 3

Famous incidents - Anonymization

  • “A Face Is Exposed for AOL Searcher No.

4417749” [Barbaro & Zeller ’06]

  • “Robust De-anonymization of Large

Datasets (How to Break Anonymity of the Netflix 
 Prize Dataset)”[Narayanan & Shmatikov ’08]

  • “Matching Known Patients to Health

Records in Washington State Data” [Sweeney ’13] 
 


slide-4
SLIDE 4

Machine Learning Models that Remember Too Much [Song’17]

Membership Inference Attacks Against Machine Learning Models [Shokri’17] Practical Black-Box Attacks against Machine Learning [Papernot’17] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [Fredrikson’15]

slide-5
SLIDE 5

Solutions for Private Aggregation / Training

  • Differential Privacy [Dwork’06] over 5000 papers on this
  • Privacy-Preserving Deep Learning [Shokri’15]
  • Federated Learning [Konecny’15 & ’16] over 300 papers on this
  • Deep Learning with Differential Privacy [Abadi’16]

https://1.bp.blogspot.com/-K65Ed68KGXk/WOa9jaRWC6I/AAAAAAAABsM/gglycD_anuQSp-i67fxER1FOlVTulvV2gCLcB/s640/ FederatedLearning_FinalFiles_Flow%2BChart1.png

slide-6
SLIDE 6

Inference Problem

Inverting Visual Representations with Convolutional Networks [Dosovitskiy’16]

slide-7
SLIDE 7

Solutions

  • MiniONN[Liu’17]
  • Arden[Wang’18]
  • Deep Private Feature Extraction[Osia’18]
  • Shredder [Mireshghallah’19]

Privacy Accuracy Loss

C

  • m

p u t a t i

  • n

a l C

  • s

t

~ ~

Shredder

Undesirable Region Accuracy-Agnostic Noise Addition Homomorphic Encryption

CryptoNets[19] Minion[21]

slide-8
SLIDE 8

Shredder

… … …

Edge Cloud

L(x, θ1) R(a0, θ2)

Activation

Noisy Activation

y = f 0(x, θ, n)

input x a a0

Noise Tensor

+

n2

<latexit sha1_base64="2gC/EUzsrfM2WwF/0jswBTB1Ta4=">AB6nicdVDJSgNBEK2JW4xb1KOXxiB4Gnqy4OQW9OIxolkgCaGn0ma9PQM3T1CGPIJXjwo4tUv8ubf2FkEFX1Q8Hiviqp6QSy4Nh/OJm19Y3Nrex2bmd3b/8gf3jU1FGiKGvQSESqHRDNBJesYbgRrB0rRsJAsFYwuZr7rXumNI/knZnGrBeSkeRDTomx0q3sF/v5AnZxseqXSwi7xXLVr/iWVHDJr3rIc/ECBVih3s+/dwcRTUImDRVE646HY9NLiTKcCjbLdRPNYkInZMQ6lkoSMt1LF6fO0JlVBmgYKVvSoIX6fSIlodbTMLCdITFj/dubi395ncQM/V7KZwYJuly0TARyERo/jcacMWoEVNLCFXc3oromChCjU0nZ0P4+hT9T5pF18Oud1Mu1C5XcWThBE7hHDy4gBpcQx0aQGED/AEz45wHp0X53XZmnFWM8fwA87bJ30je8=</latexit><latexit sha1_base64="2gC/EUzsrfM2WwF/0jswBTB1Ta4=">AB6nicdVDJSgNBEK2JW4xb1KOXxiB4Gnqy4OQW9OIxolkgCaGn0ma9PQM3T1CGPIJXjwo4tUv8ubf2FkEFX1Q8Hiviqp6QSy4Nh/OJm19Y3Nrex2bmd3b/8gf3jU1FGiKGvQSESqHRDNBJesYbgRrB0rRsJAsFYwuZr7rXumNI/knZnGrBeSkeRDTomx0q3sF/v5AnZxseqXSwi7xXLVr/iWVHDJr3rIc/ECBVih3s+/dwcRTUImDRVE646HY9NLiTKcCjbLdRPNYkInZMQ6lkoSMt1LF6fO0JlVBmgYKVvSoIX6fSIlodbTMLCdITFj/dubi395ncQM/V7KZwYJuly0TARyERo/jcacMWoEVNLCFXc3oromChCjU0nZ0P4+hT9T5pF18Oud1Mu1C5XcWThBE7hHDy4gBpcQx0aQGED/AEz45wHp0X53XZmnFWM8fwA87bJ30je8=</latexit><latexit sha1_base64="2gC/EUzsrfM2WwF/0jswBTB1Ta4=">AB6nicdVDJSgNBEK2JW4xb1KOXxiB4Gnqy4OQW9OIxolkgCaGn0ma9PQM3T1CGPIJXjwo4tUv8ubf2FkEFX1Q8Hiviqp6QSy4Nh/OJm19Y3Nrex2bmd3b/8gf3jU1FGiKGvQSESqHRDNBJesYbgRrB0rRsJAsFYwuZr7rXumNI/knZnGrBeSkeRDTomx0q3sF/v5AnZxseqXSwi7xXLVr/iWVHDJr3rIc/ECBVih3s+/dwcRTUImDRVE646HY9NLiTKcCjbLdRPNYkInZMQ6lkoSMt1LF6fO0JlVBmgYKVvSoIX6fSIlodbTMLCdITFj/dubi395ncQM/V7KZwYJuly0TARyERo/jcacMWoEVNLCFXc3oromChCjU0nZ0P4+hT9T5pF18Oud1Mu1C5XcWThBE7hHDy4gBpcQx0aQGED/AEz45wHp0X53XZmnFWM8fwA87bJ30je8=</latexit><latexit sha1_base64="2gC/EUzsrfM2WwF/0jswBTB1Ta4=">AB6nicdVDJSgNBEK2JW4xb1KOXxiB4Gnqy4OQW9OIxolkgCaGn0ma9PQM3T1CGPIJXjwo4tUv8ubf2FkEFX1Q8Hiviqp6QSy4Nh/OJm19Y3Nrex2bmd3b/8gf3jU1FGiKGvQSESqHRDNBJesYbgRrB0rRsJAsFYwuZr7rXumNI/knZnGrBeSkeRDTomx0q3sF/v5AnZxseqXSwi7xXLVr/iWVHDJr3rIc/ECBVih3s+/dwcRTUImDRVE646HY9NLiTKcCjbLdRPNYkInZMQ6lkoSMt1LF6fO0JlVBmgYKVvSoIX6fSIlodbTMLCdITFj/dubi395ncQM/V7KZwYJuly0TARyERo/jcacMWoEVNLCFXc3oromChCjU0nZ0P4+hT9T5pF18Oud1Mu1C5XcWThBE7hHDy4gBpcQx0aQGED/AEz45wHp0X53XZmnFWM8fwA87bJ30je8=</latexit>

Noise Tensor

n1

<latexit sha1_base64="TbOVm4a1bj7EWv2q2BG16ZUEIEA=">AB6nicbVBNS8NAEJ3Ur1q/oh69LBbBU0lE0GPRi8eK9gPaUDbSbt0swm7G6GE/gQvHhTx6i/y5r9x2+agrQ8GHu/NMDMvTAXxvO+ndLa+sbmVnm7srO7t3/gHh61dJIphk2WiER1QqpRcIlNw43ATqQxqHAdji+nfntJ1SaJ/LRTFIMYjqUPOKMGis9yL7fd6tezZuDrBK/IFUo0Oi7X71BwrIYpWGCat31vdQEOVWGM4HTSi/TmFI2pkPsWipjDrI56dOyZlVBiRKlC1pyFz9PZHTWOtJHNrOmJqRXvZm4n9eNzPRdZBzmWYGJVsijJBTEJmf5MBV8iMmFhCmeL2VsJGVFmbDoVG4K/PIqaV3UfK/m319W6zdFHGU4gVM4Bx+uoA530IAmMBjCM7zCmyOcF+fd+Vi0lpxi5hj+wPn8AfxljZY=</latexit><latexit sha1_base64="TbOVm4a1bj7EWv2q2BG16ZUEIEA=">AB6nicbVBNS8NAEJ3Ur1q/oh69LBbBU0lE0GPRi8eK9gPaUDbSbt0swm7G6GE/gQvHhTx6i/y5r9x2+agrQ8GHu/NMDMvTAXxvO+ndLa+sbmVnm7srO7t3/gHh61dJIphk2WiER1QqpRcIlNw43ATqQxqHAdji+nfntJ1SaJ/LRTFIMYjqUPOKMGis9yL7fd6tezZuDrBK/IFUo0Oi7X71BwrIYpWGCat31vdQEOVWGM4HTSi/TmFI2pkPsWipjDrI56dOyZlVBiRKlC1pyFz9PZHTWOtJHNrOmJqRXvZm4n9eNzPRdZBzmWYGJVsijJBTEJmf5MBV8iMmFhCmeL2VsJGVFmbDoVG4K/PIqaV3UfK/m319W6zdFHGU4gVM4Bx+uoA530IAmMBjCM7zCmyOcF+fd+Vi0lpxi5hj+wPn8AfxljZY=</latexit><latexit sha1_base64="TbOVm4a1bj7EWv2q2BG16ZUEIEA=">AB6nicbVBNS8NAEJ3Ur1q/oh69LBbBU0lE0GPRi8eK9gPaUDbSbt0swm7G6GE/gQvHhTx6i/y5r9x2+agrQ8GHu/NMDMvTAXxvO+ndLa+sbmVnm7srO7t3/gHh61dJIphk2WiER1QqpRcIlNw43ATqQxqHAdji+nfntJ1SaJ/LRTFIMYjqUPOKMGis9yL7fd6tezZuDrBK/IFUo0Oi7X71BwrIYpWGCat31vdQEOVWGM4HTSi/TmFI2pkPsWipjDrI56dOyZlVBiRKlC1pyFz9PZHTWOtJHNrOmJqRXvZm4n9eNzPRdZBzmWYGJVsijJBTEJmf5MBV8iMmFhCmeL2VsJGVFmbDoVG4K/PIqaV3UfK/m319W6zdFHGU4gVM4Bx+uoA530IAmMBjCM7zCmyOcF+fd+Vi0lpxi5hj+wPn8AfxljZY=</latexit><latexit sha1_base64="TbOVm4a1bj7EWv2q2BG16ZUEIEA=">AB6nicbVBNS8NAEJ3Ur1q/oh69LBbBU0lE0GPRi8eK9gPaUDbSbt0swm7G6GE/gQvHhTx6i/y5r9x2+agrQ8GHu/NMDMvTAXxvO+ndLa+sbmVnm7srO7t3/gHh61dJIphk2WiER1QqpRcIlNw43ATqQxqHAdji+nfntJ1SaJ/LRTFIMYjqUPOKMGis9yL7fd6tezZuDrBK/IFUo0Oi7X71BwrIYpWGCat31vdQEOVWGM4HTSi/TmFI2pkPsWipjDrI56dOyZlVBiRKlC1pyFz9PZHTWOtJHNrOmJqRXvZm4n9eNzPRdZBzmWYGJVsijJBTEJmf5MBV8iMmFhCmeL2VsJGVFmbDoVG4K/PIqaV3UfK/m319W6zdFHGU4gVM4Bx+uoA530IAmMBjCM7zCmyOcF+fd+Vi0lpxi5hj+wPn8AfxljZY=</latexit>
slide-9
SLIDE 9

Shredder

  • Non-intrusive
  • 66.7% loss in information
  • 97.3% misclassifaction of private labels
  • 1.7% loss in classification of publica labels

fmireshg@ucsd.edu http://cseweb.ucsd.edu/~fmireshg/ Dec 14th (saturday) - Privacy in Machine Learning Workshop (East Meeting Rooms 8+15) -11:30 AM

slide-10
SLIDE 10
slide-11
SLIDE 11

No Nois ise dis e distribut ibutio ion T n Training phas aining phase

Network Partitioner Intermediate Activation Adder Noisy Activation Network Output (logits) Noise Tensor Training Data Transformer with Edge Partition

5 8 8 2 3 4 1 7 3 5 8 8 2 3 4 1 7 3

Loss Input Generator with Cloud Partition Batch of Data From the Training Dataset Loss Function and Optimizer Calculated Gradients Noise Tensor Update Noise Tensor Initializer DNN Topology and Pretrained Weights Accuracy > Desired

Distribution Parameters and Order
  • f Noise Elements Collector

Noise Tensor to Laplace Distribution Fitter Yes Yes No No

Collection of Distributions and Orders with Confidence interval

Computation and Communication Costs Desired Accuracy 1 2 3 4 5 6 7 8 9 Distribution Parameters and Order of Noise Elements Collector Distance of the Distribution and Noise Tensor < Desired

slide-12
SLIDE 12

In Infer eren ence p ce phas ase

Intermediate Activation Adder Noisy Activation (to be sent) Transmission Noisy Activation (received) Classification Result Sampler Collection of Distributions and Orders Noise Tensor (Mist)

Edge

Edge Partition Cloud Partition

5 8 8 2 3 4 1 7 3 5 8 8 2 3 4 1 7 3

1 2 3 4 5

Cloud

5

slide-13
SLIDE 13

Cross Entropy Loss Learn and remove private labels using only the given public labels, through self-supervision.

slide-14
SLIDE 14

Shredder reduces the mutual information between the input and the communicated data and removes sensitive information through self- supervision. Shredder stabilizes privacy at a high level, while increasing accuracy of the primary task and decreasing the accuracy of the private task.

slide-15
SLIDE 15

Shredder can perform well with any cutting point. Using an edge GPU, shredder can offer speed-ups.

slide-16
SLIDE 16

Shredder’s privacy/accuracy trade-off on public and private labels (Primary and private task).

slide-17
SLIDE 17

Comparison with Deep Private Feature Extraction (DPFE) method, which needs provide labels and modifies network weights, unlike Shredder.