Michael Aerni*, Jie Zhang* and Florian Tramèr
ACM SIGSAC Conference on Computer and Communications Security (CCS) 2024
Empirical defenses for machine learning privacy forgo the provable guarantees of differential privacy in the hope of achieving higher utility while resisting realistic adversaries. We identify severe pitfalls in existing empirical privacy evaluations (based on membership inference attacks) that result in misleading conclusions. In particular, we show that prior evaluations fail to characterize the privacy leakage of the most vulnerable samples, use weak attacks, and avoid comparisons with practical differential privacy baselines. In 5 case studies of empirical privacy defenses, we find that prior evaluations underestimate privacy leakage by an order of magnitude. Under our stronger evaluation, none of the empirical defenses we study are competitive with a properly tuned, high-utility DP-SGD baseline (with vacuous provable guarantees).
@inproceedings{AZT24, | |||
author | = | {Aerni, Michael and Zhang, Jie and Tram{\`e}r, Florian}, | |
title | = | {Evaluations of Machine Learning Privacy Defenses are Misleading}, | |
booktitle | = | {ACM SIGSAC Conference on Computer and Communications Security (CCS)}, | |
year | = | {2024}, | |
howpublished | = | {arXiv preprint arXiv:2404.17399}, | |
url | = | {https://arxiv.org/abs/2404.17399} | |
} |