Debeshee Das, Jie Zhang and Florian Tramèr
Membership inference (MI) attacks try to determine if a data sample was used to train a machine learning model. For foundation models trained on unknown Web data, MI attacks can be used to detect copyrighted training materials, measure test set contamination, or audit machine unlearning. Unfortunately, we find that evaluations of MI attacks for foundation models are flawed, because they sample members and non-members from different distributions. For 8 published MI evaluation datasets, we show that blind attacks – that distinguish the member and non-member distributions without looking at any trained model – outperform state-of-the-art MI attacks. Existing evaluations thus tell us nothing about membership leakage of a foundation model’s training data.
@misc{DZT24, | |||
author | = | {Das, Debeshee and Zhang, Jie and Tram{\`e}r, Florian}, | |
title | = | {Blind Baselines Beat Membership Inference Attacks for Foundation Models}, | |
year | = | {2024}, | |
howpublished | = | {arXiv preprint arXiv:2406.16201}, | |
url | = | {https://arxiv.org/abs/2406.16201} | |
} |