Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks
Abstract
Model inversion attacks (MIAs) aim to create synthetic images that reflect the class-wise characteristics from a target classifier’s private training data by exploiting the model’s learned knowledge. Previous research has developed generative MIAs that use generative adversarial networks (GANs) as image priors tailored to a specific target model. This makes the attacks time- and resource-consuming, inflexible, and susceptible to distributional shifts between datasets. To overcome these drawbacks, we present Plug & Play Attacks, which relax the dependency between the target model and image prior, and enable the use of a single GAN to attack a wide range of targets, requiring only minor adjustments to the attack. Moreover, we show that powerful MIAs are possible even with publicly available pre-trained GANs and under strong distributional shifts, for which previous approaches fail to produce meaningful results. Our extensive evaluation confirms the improved robustness and flexibility of Plug & Play Attacks and their ability to create high-quality images revealing sensitive class characteristics.
Cite
Text
Struppek et al. "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks." International Conference on Machine Learning, 2022.Markdown
[Struppek et al. "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks." International Conference on Machine Learning, 2022.](https://mlanthology.org/icml/2022/struppek2022icml-plug/)BibTeX
@inproceedings{struppek2022icml-plug,
title = {{Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks}},
author = {Struppek, Lukas and Hintersdorf, Dominik and De Almeida Correira, Antonio and Adler, Antonia and Kersting, Kristian},
booktitle = {International Conference on Machine Learning},
year = {2022},
pages = {20522-20545},
volume = {162},
url = {https://mlanthology.org/icml/2022/struppek2022icml-plug/}
}