AlanPeng0897 / Defend_MI

[KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"
https://arxiv.org/pdf/2206.05483.pdf
MIT License
22 stars 5 forks source link
model-inversion-attacks privacy-preserving-machine-learning

Bilateral Dependency Optimization: Defending Against Model-inversion Attacks

Paper Github License

Hi, this is the code for our KDD 2022 paper: Bilateral Dependency Optimization: Defending Against Model-inversion Attacks. BiDO_vs_MID Overview of MID framework vs. bilateral dependency optimization (BiDO) framework. BiDO forces DNNs to learn robust latent representations by minimizing $𝑑(𝑋,𝑍_j)$ to limit redundant information propagated from the inputs to the latent representations while maximizing $𝑑(𝑍_j,π‘Œ)$ to keep the latent representations informative enough of the label.

Requiements

This code has been tested on Ubuntu 16.04/18.04, with Python 3.7, Pytorch 1.7 and CUDA 10.2/11.0

Getting started

Download relevant datasets: CelebA, MNIST.

The directory of datasets is organized as follows:

./attack_dataset
β”œβ”€β”€ MNIST 
β”‚   β”œβ”€β”€ *.txt 
β”‚   └── Img
β”‚       └── *.png
└── CelebA                            
    β”œβ”€β”€ *.txt 
    └── Img
        └── *.png

Privacy enhancement with BiDO

You can also skip to the next section for defending against MI attacks with well-trained defense models.

Defending against MI attacks

Here, we only provide the weights file of the well-trained defense models that achieve the best trade-off between model robustness and utility, which are highlighted in the experimental results.

References

If you find this code helpful in your research, please consider citing

@inproceedings{peng2022BiDO,
title={Bilateral Dependency Optimization: Defending Against Model-inversion Attacks},
author={Peng, Xiong and Liu, Feng and Zhang, Jingfeng and Lan, Long and Ye, Junjie and Liu, Tongliang and Han, Bo},
booktitle={KDD},
year={2022}
}

Implementation Credits

Some of our implementations rely on other repos. We want to thank the authors (MID, GMI, KED-MI, VMI) for making their code publicly available.πŸ˜„