SlideShare a Scribd company logo
1 of 24
Exploring Connections between
Active Learning and Model Extraction
Anmol Dwivedi
with credits to the original presentation by the authors at the 2020 USENIX conference*
Introduction
• Paper: Exploring Connections between Active Learning and Model Extraction
• Conference: 29th USENIX Security Symposium
• Dates: August 12th-14th, 2020
• Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan
Overview
1. Model Extraction from MLaaS
• Motivation
• Definition
4. Defense Strategies
• Data Dependent Defense Strategies
• Data Independent Defense Strategies
2. Machine Learning
• Passive Learning
• Active Learning
3. Evaluate Performance
• Linear Models
• Non-linear Models
5. Summary & Open Questions
Machine Learning as a Service (MLaaS)
User
Data
Local Server
MLaaS
(Oracle Access)
Query
Answer
Query Interface
Advantages:
• Scalability
• Availability
• Monetizability of the model
(pay per query regime)
Model Extraction
Adversary Goals:
• White-box Inversion, Membership
Inference and Model Inversion attacks
• Undermine the pay per query regime
Query
Objectives:
1. Learn an approximation of the model
2. Use as few queries as possible
Example: Equation Solving (ES) Attack for Linear Regression
• Strategy for adversary:
• Solve a system of linear equations:
• Experiment outcome:
Use Machine Learning (ML) to solve for strategies for more difficult Hypothesis
classes!
Machine Learning
Passive Learning Active Learning
Which setting should the adversary choose?
Passive Learning Setting
• Learner (adversary) has access to a large labeled dataset D in its entirety
• Typically, Probably Approximately Correct (PAC) framework is used to learn f where for algorithm A
Algorithm outputs a function within risk
tolerance with confidence by
using i.i.d data-points
Empirical Risk Minimization (ERM)
• Problem: Well known inequalities such as Hoeffding’s bound tell us that as
the sample complexity grows rapidly!
Active Learning Setting
• Learner (adversary) has access to a smaller set of labeled instances (lower sample complexity regime)
• Learner can actively choose that benefits their query strategy
• By intelligently choosing the learner can drastically reduce sample complexity!
Learner
Oracle
Lower Query Complexity
Trade-off: Error VS Query Complexity
than passive learning
Model extraction is similar to Active Learning
Example: Half-Space Extraction (d=1)
-1
-1 -1 +1 +1 +1 +1 +1
• Passive PAC Learning:
• Active Learning:  Intuitive: Simple Binary Search!
Active Learning
PAC Active Learning Query Synthesis (QS) Active Learning
PAC Scenario
• Assumes access to the data distribution on (X, Y).
• The learner then decides whether to query a given
data-point x once given a data set.
QS Scenario
• Assumes no access to data distribution on (X, Y).
• Rather, the instances are generated by learner
(even if it might have zero probability of
generation).
• Query Synthesis (QS) active learning is more suitable for model extraction due to lesser
prior knowledge requirement about the data distribution.
• Hence, any active learning algorithm in the QS scenario can be used for model extraction!
Advancement in Active Learning Threat to MLaaS systems
Evaluation: Half-Space Extraction (Linear Models)
Evaluation: Non-Linear Models (kernel SVMs & Decision Trees)
Kernel SVMs (RBF kernel)
extraction via the Adaptive
Retraining and the EAT (proposed)
active learning algorithm
Decision Tree extraction via the Path
Finding and IWAL (proposed) active
learning algorithm
Prior work Prior work
Proposed Proposed
Defense Strategies
Link between ML in noisy setting and model extraction
Server implements randomized
defense strategy D
Client
Client gets noisy answers from server instead of
• Result in more queries than usual
• Less accurate model
Consequences:
Example: Binary Classification
Probability that server outputs the
wrong answer
Upper bound on the
probability of a wrong answer
Data-Independent Randomization
if
Defense D is not secure
else
Server is useless since it outputs incorrect labels most of the time
A bound on the number of samples required is
Evaluation of Defense Strategies: Data-Independent noise
d=64 d=13
Model extraction is possible
despite the data independent
noise strategy D
Data-Dependent Randomization
• Use training data to learn a distribution of models!
• One possible strategy:
Evaluation of Defense Strategies: Data-Dependent noise
Model extraction is NOT possible
and is secure against this
particular Data-Dependent
defense active learning strategy!
No “free lunch” for defense
Model extraction is inevitable
• Data independent defense mechanisms fail
• Data dependent defense mechanisms fail against passive learning approaches
Summary
• Connection between Active Learning and Model Extraction
• Provide attacks under more realistic scenarios
• No free lunch, i.e., model extraction is inevitable
Open Questions
Query Synthesis
Active Learning
(QSAL) algorithms
for DNNs
Determining the
model type hosted on
the server through
“hard label” query
interactions
Re-use the labeled
data to learn
another different,
hypothesis space
Data dependent
defense mechanisms
for real-valued target
functions f
Q&A
Thank You

More Related Content

What's hot

Predicting student performance using aggregated data sources
Predicting student performance using aggregated data sourcesPredicting student performance using aggregated data sources
Predicting student performance using aggregated data sourcesOlugbenga Wilson Adejo
 
Student Grade Prediction
Student Grade PredictionStudent Grade Prediction
Student Grade PredictionGaurav Sawant
 
Дмитрий Ветров. Математика больших данных: тензоры, нейросети, байесовский вы...
Дмитрий Ветров. Математика больших данных: тензоры, нейросети, байесовский вы...Дмитрий Ветров. Математика больших данных: тензоры, нейросети, байесовский вы...
Дмитрий Ветров. Математика больших данных: тензоры, нейросети, байесовский вы...Yandex
 
Category & Training Texts Selection for Scientific Article Categorization in ...
Category & Training Texts Selection for Scientific Article Categorization in ...Category & Training Texts Selection for Scientific Article Categorization in ...
Category & Training Texts Selection for Scientific Article Categorization in ...Gan Keng Hoon
 
Izobrazevanje za data-mining
Izobrazevanje za data-miningIzobrazevanje za data-mining
Izobrazevanje za data-miningbutest
 
Mobile technology in mathematics classroom
Mobile technology in mathematics classroomMobile technology in mathematics classroom
Mobile technology in mathematics classroomUzma Shaikh
 
ICIS Module Spec - BI1H57 Experimental Design and Data Manipulation
ICIS Module Spec - BI1H57 Experimental Design and Data ManipulationICIS Module Spec - BI1H57 Experimental Design and Data Manipulation
ICIS Module Spec - BI1H57 Experimental Design and Data ManipulationDaniel Band
 
Crowdsourcing Predictors of Behavioral Outcomes
Crowdsourcing Predictors of Behavioral OutcomesCrowdsourcing Predictors of Behavioral Outcomes
Crowdsourcing Predictors of Behavioral OutcomesAlekya Yermal
 
Studying Public Medical Images from Open Access Literature and Social Network...
Studying Public Medical Images from Open Access Literature and Social Network...Studying Public Medical Images from Open Access Literature and Social Network...
Studying Public Medical Images from Open Access Literature and Social Network...Institute of Information Systems (HES-SO)
 
Revisiting evolutionary information filtering
Revisiting evolutionary information filteringRevisiting evolutionary information filtering
Revisiting evolutionary information filteringManolis Vavalis
 
RallyZ: Session 2
RallyZ: Session 2RallyZ: Session 2
RallyZ: Session 2Quadlyfe
 
IEEE 2014 JAVA DATA MINING PROJECTS Active learning of constraints for semi s...
IEEE 2014 JAVA DATA MINING PROJECTS Active learning of constraints for semi s...IEEE 2014 JAVA DATA MINING PROJECTS Active learning of constraints for semi s...
IEEE 2014 JAVA DATA MINING PROJECTS Active learning of constraints for semi s...IEEEFINALYEARSTUDENTPROJECTS
 
PPT SLIDES
PPT SLIDESPPT SLIDES
PPT SLIDESbutest
 
Introduction to Data Science - Week 2 - Predictive Analytics
Introduction to Data Science - Week 2 - Predictive AnalyticsIntroduction to Data Science - Week 2 - Predictive Analytics
Introduction to Data Science - Week 2 - Predictive AnalyticsFerdin Joe John Joseph PhD
 
Past, present, and future of Recommender Systems: an industry perspective
Past, present, and future of Recommender Systems: an industry perspectivePast, present, and future of Recommender Systems: an industry perspective
Past, present, and future of Recommender Systems: an industry perspectiveXavier Amatriain
 
Recommending Scientific Papers: Investigating the User Curriculum
Recommending Scientific Papers: Investigating the User CurriculumRecommending Scientific Papers: Investigating the User Curriculum
Recommending Scientific Papers: Investigating the User CurriculumJonathas Magalhães
 
An overview of machine learning (1)
An overview of machine learning (1)An overview of machine learning (1)
An overview of machine learning (1)Pranjal Tiwari
 

What's hot (18)

Predicting student performance using aggregated data sources
Predicting student performance using aggregated data sourcesPredicting student performance using aggregated data sources
Predicting student performance using aggregated data sources
 
Student Grade Prediction
Student Grade PredictionStudent Grade Prediction
Student Grade Prediction
 
Дмитрий Ветров. Математика больших данных: тензоры, нейросети, байесовский вы...
Дмитрий Ветров. Математика больших данных: тензоры, нейросети, байесовский вы...Дмитрий Ветров. Математика больших данных: тензоры, нейросети, байесовский вы...
Дмитрий Ветров. Математика больших данных: тензоры, нейросети, байесовский вы...
 
Category & Training Texts Selection for Scientific Article Categorization in ...
Category & Training Texts Selection for Scientific Article Categorization in ...Category & Training Texts Selection for Scientific Article Categorization in ...
Category & Training Texts Selection for Scientific Article Categorization in ...
 
Izobrazevanje za data-mining
Izobrazevanje za data-miningIzobrazevanje za data-mining
Izobrazevanje za data-mining
 
Mobile technology in mathematics classroom
Mobile technology in mathematics classroomMobile technology in mathematics classroom
Mobile technology in mathematics classroom
 
Strategy Pattern
Strategy PatternStrategy Pattern
Strategy Pattern
 
ICIS Module Spec - BI1H57 Experimental Design and Data Manipulation
ICIS Module Spec - BI1H57 Experimental Design and Data ManipulationICIS Module Spec - BI1H57 Experimental Design and Data Manipulation
ICIS Module Spec - BI1H57 Experimental Design and Data Manipulation
 
Crowdsourcing Predictors of Behavioral Outcomes
Crowdsourcing Predictors of Behavioral OutcomesCrowdsourcing Predictors of Behavioral Outcomes
Crowdsourcing Predictors of Behavioral Outcomes
 
Studying Public Medical Images from Open Access Literature and Social Network...
Studying Public Medical Images from Open Access Literature and Social Network...Studying Public Medical Images from Open Access Literature and Social Network...
Studying Public Medical Images from Open Access Literature and Social Network...
 
Revisiting evolutionary information filtering
Revisiting evolutionary information filteringRevisiting evolutionary information filtering
Revisiting evolutionary information filtering
 
RallyZ: Session 2
RallyZ: Session 2RallyZ: Session 2
RallyZ: Session 2
 
IEEE 2014 JAVA DATA MINING PROJECTS Active learning of constraints for semi s...
IEEE 2014 JAVA DATA MINING PROJECTS Active learning of constraints for semi s...IEEE 2014 JAVA DATA MINING PROJECTS Active learning of constraints for semi s...
IEEE 2014 JAVA DATA MINING PROJECTS Active learning of constraints for semi s...
 
PPT SLIDES
PPT SLIDESPPT SLIDES
PPT SLIDES
 
Introduction to Data Science - Week 2 - Predictive Analytics
Introduction to Data Science - Week 2 - Predictive AnalyticsIntroduction to Data Science - Week 2 - Predictive Analytics
Introduction to Data Science - Week 2 - Predictive Analytics
 
Past, present, and future of Recommender Systems: an industry perspective
Past, present, and future of Recommender Systems: an industry perspectivePast, present, and future of Recommender Systems: an industry perspective
Past, present, and future of Recommender Systems: an industry perspective
 
Recommending Scientific Papers: Investigating the User Curriculum
Recommending Scientific Papers: Investigating the User CurriculumRecommending Scientific Papers: Investigating the User Curriculum
Recommending Scientific Papers: Investigating the User Curriculum
 
An overview of machine learning (1)
An overview of machine learning (1)An overview of machine learning (1)
An overview of machine learning (1)
 

Similar to Connections b/w active learning and model extraction

ML.pptvdvdvdvdvdfvdfgvdsdgdsfgdfgdfgdfgdf
ML.pptvdvdvdvdvdfvdfgvdsdgdsfgdfgdfgdfgdfML.pptvdvdvdvdvdfvdfgvdsdgdsfgdfgdfgdfgdf
ML.pptvdvdvdvdvdfvdfgvdsdgdsfgdfgdfgdfgdfAvijitChaudhuri3
 
Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies Micah Altman
 
June brownbagpressurvey
June brownbagpressurveyJune brownbagpressurvey
June brownbagpressurveyMicah Altman
 
Intro to machine learning
Intro to machine learningIntro to machine learning
Intro to machine learningAkshay Kanchan
 
Introduction to machine learning-2023-IT-AI and DS.pdf
Introduction to machine learning-2023-IT-AI and DS.pdfIntroduction to machine learning-2023-IT-AI and DS.pdf
Introduction to machine learning-2023-IT-AI and DS.pdfSisayNegash4
 
Lecture 2 Data mining process.pdf
Lecture 2 Data mining process.pdfLecture 2 Data mining process.pdf
Lecture 2 Data mining process.pdfKaushik Kundu
 
Overview of data programming: easing the bottleneck of supervised machine lea...
Overview of data programming: easing the bottleneck of supervised machine lea...Overview of data programming: easing the bottleneck of supervised machine lea...
Overview of data programming: easing the bottleneck of supervised machine lea...datalab-vietnam
 
ICELW Conference Slides
ICELW Conference SlidesICELW Conference Slides
ICELW Conference Slidestoolboc
 
Probability density estimation using Product of Conditional Experts
Probability density estimation using Product of Conditional ExpertsProbability density estimation using Product of Conditional Experts
Probability density estimation using Product of Conditional ExpertsChirag Gupta
 
Machine Learning 2 deep Learning: An Intro
Machine Learning 2 deep Learning: An IntroMachine Learning 2 deep Learning: An Intro
Machine Learning 2 deep Learning: An IntroSi Krishan
 
Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...
Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...
Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...Maninda Edirisooriya
 
Few shot learning/ one shot learning/ machine learning
Few shot learning/ one shot learning/ machine learningFew shot learning/ one shot learning/ machine learning
Few shot learning/ one shot learning/ machine learningﺁﺻﻒ ﻋﻠﯽ ﻣﯿﺮ
 
Activity Monitoring Using Wearable Sensors and Smart Phone
Activity Monitoring Using Wearable Sensors and Smart PhoneActivity Monitoring Using Wearable Sensors and Smart Phone
Activity Monitoring Using Wearable Sensors and Smart PhoneDrAhmedZoha
 

Similar to Connections b/w active learning and model extraction (20)

ML.ppt
ML.pptML.ppt
ML.ppt
 
ML.ppt
ML.pptML.ppt
ML.ppt
 
ML.ppt
ML.pptML.ppt
ML.ppt
 
ML.ppt
ML.pptML.ppt
ML.ppt
 
ML.pptvdvdvdvdvdfvdfgvdsdgdsfgdfgdfgdfgdf
ML.pptvdvdvdvdvdfvdfgvdsdgdsfgdfgdfgdfgdfML.pptvdvdvdvdvdfvdfgvdsdgdsfgdfgdfgdfgdf
ML.pptvdvdvdvdvdfvdfgvdsdgdsfgdfgdfgdfgdf
 
ML.ppt
ML.pptML.ppt
ML.ppt
 
Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies
 
June brownbagpressurvey
June brownbagpressurveyJune brownbagpressurvey
June brownbagpressurvey
 
Intro to machine learning
Intro to machine learningIntro to machine learning
Intro to machine learning
 
Introduction to machine learning-2023-IT-AI and DS.pdf
Introduction to machine learning-2023-IT-AI and DS.pdfIntroduction to machine learning-2023-IT-AI and DS.pdf
Introduction to machine learning-2023-IT-AI and DS.pdf
 
Lecture 2 Data mining process.pdf
Lecture 2 Data mining process.pdfLecture 2 Data mining process.pdf
Lecture 2 Data mining process.pdf
 
Overview of data programming: easing the bottleneck of supervised machine lea...
Overview of data programming: easing the bottleneck of supervised machine lea...Overview of data programming: easing the bottleneck of supervised machine lea...
Overview of data programming: easing the bottleneck of supervised machine lea...
 
ICELW Conference Slides
ICELW Conference SlidesICELW Conference Slides
ICELW Conference Slides
 
Probability density estimation using Product of Conditional Experts
Probability density estimation using Product of Conditional ExpertsProbability density estimation using Product of Conditional Experts
Probability density estimation using Product of Conditional Experts
 
Machine Learning 2 deep Learning: An Intro
Machine Learning 2 deep Learning: An IntroMachine Learning 2 deep Learning: An Intro
Machine Learning 2 deep Learning: An Intro
 
Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...
Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...
Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...
 
Introduction to machine learning
Introduction to machine learningIntroduction to machine learning
Introduction to machine learning
 
Machine_Learning.pptx
Machine_Learning.pptxMachine_Learning.pptx
Machine_Learning.pptx
 
Few shot learning/ one shot learning/ machine learning
Few shot learning/ one shot learning/ machine learningFew shot learning/ one shot learning/ machine learning
Few shot learning/ one shot learning/ machine learning
 
Activity Monitoring Using Wearable Sensors and Smart Phone
Activity Monitoring Using Wearable Sensors and Smart PhoneActivity Monitoring Using Wearable Sensors and Smart Phone
Activity Monitoring Using Wearable Sensors and Smart Phone
 

More from Anmol Dwivedi

Tutorial on Markov Random Fields (MRFs) for Computer Vision Applications
Tutorial on Markov Random Fields (MRFs) for Computer Vision ApplicationsTutorial on Markov Random Fields (MRFs) for Computer Vision Applications
Tutorial on Markov Random Fields (MRFs) for Computer Vision ApplicationsAnmol Dwivedi
 
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)Anmol Dwivedi
 
Linear Discriminant Analysis (LDA) Under f-Divergence Measures
Linear Discriminant Analysis (LDA) Under f-Divergence MeasuresLinear Discriminant Analysis (LDA) Under f-Divergence Measures
Linear Discriminant Analysis (LDA) Under f-Divergence MeasuresAnmol Dwivedi
 
Tutorial on Belief Propagation in Bayesian Networks
Tutorial on Belief Propagation in Bayesian NetworksTutorial on Belief Propagation in Bayesian Networks
Tutorial on Belief Propagation in Bayesian NetworksAnmol Dwivedi
 
Voltage stability Analysis using GridCal
Voltage stability Analysis using GridCalVoltage stability Analysis using GridCal
Voltage stability Analysis using GridCalAnmol Dwivedi
 
Inference & Learning in Linear-Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear-Chain Conditional Random Fields (CRFs)Inference & Learning in Linear-Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear-Chain Conditional Random Fields (CRFs)Anmol Dwivedi
 
Simulated Annealing for Optimal Power Flow (OPF)
Simulated Annealing for Optimal Power Flow (OPF)Simulated Annealing for Optimal Power Flow (OPF)
Simulated Annealing for Optimal Power Flow (OPF)Anmol Dwivedi
 
Linear Discriminant Analysis (LDA)
Linear Discriminant Analysis (LDA)Linear Discriminant Analysis (LDA)
Linear Discriminant Analysis (LDA)Anmol Dwivedi
 
Detection of Generator Loss of Excitation (LOE)
Detection of Generator Loss of Excitation (LOE)Detection of Generator Loss of Excitation (LOE)
Detection of Generator Loss of Excitation (LOE)Anmol Dwivedi
 
Rotor Resistance Control of Wound Rotor Induction Generator (WRIG) using PSCA...
Rotor Resistance Control of Wound Rotor Induction Generator (WRIG) using PSCA...Rotor Resistance Control of Wound Rotor Induction Generator (WRIG) using PSCA...
Rotor Resistance Control of Wound Rotor Induction Generator (WRIG) using PSCA...Anmol Dwivedi
 
IEEE International Conference Presentation
IEEE International Conference PresentationIEEE International Conference Presentation
IEEE International Conference PresentationAnmol Dwivedi
 
Presentation on listening effectively.
Presentation on listening effectively.Presentation on listening effectively.
Presentation on listening effectively.Anmol Dwivedi
 

More from Anmol Dwivedi (13)

Tutorial on Markov Random Fields (MRFs) for Computer Vision Applications
Tutorial on Markov Random Fields (MRFs) for Computer Vision ApplicationsTutorial on Markov Random Fields (MRFs) for Computer Vision Applications
Tutorial on Markov Random Fields (MRFs) for Computer Vision Applications
 
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
 
Linear Discriminant Analysis (LDA) Under f-Divergence Measures
Linear Discriminant Analysis (LDA) Under f-Divergence MeasuresLinear Discriminant Analysis (LDA) Under f-Divergence Measures
Linear Discriminant Analysis (LDA) Under f-Divergence Measures
 
Tutorial on Belief Propagation in Bayesian Networks
Tutorial on Belief Propagation in Bayesian NetworksTutorial on Belief Propagation in Bayesian Networks
Tutorial on Belief Propagation in Bayesian Networks
 
Voltage stability Analysis using GridCal
Voltage stability Analysis using GridCalVoltage stability Analysis using GridCal
Voltage stability Analysis using GridCal
 
Inference & Learning in Linear-Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear-Chain Conditional Random Fields (CRFs)Inference & Learning in Linear-Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear-Chain Conditional Random Fields (CRFs)
 
Simulated Annealing for Optimal Power Flow (OPF)
Simulated Annealing for Optimal Power Flow (OPF)Simulated Annealing for Optimal Power Flow (OPF)
Simulated Annealing for Optimal Power Flow (OPF)
 
Linear Discriminant Analysis (LDA)
Linear Discriminant Analysis (LDA)Linear Discriminant Analysis (LDA)
Linear Discriminant Analysis (LDA)
 
Detection of Generator Loss of Excitation (LOE)
Detection of Generator Loss of Excitation (LOE)Detection of Generator Loss of Excitation (LOE)
Detection of Generator Loss of Excitation (LOE)
 
Rotor Resistance Control of Wound Rotor Induction Generator (WRIG) using PSCA...
Rotor Resistance Control of Wound Rotor Induction Generator (WRIG) using PSCA...Rotor Resistance Control of Wound Rotor Induction Generator (WRIG) using PSCA...
Rotor Resistance Control of Wound Rotor Induction Generator (WRIG) using PSCA...
 
IEEE International Conference Presentation
IEEE International Conference PresentationIEEE International Conference Presentation
IEEE International Conference Presentation
 
Presentation on listening effectively.
Presentation on listening effectively.Presentation on listening effectively.
Presentation on listening effectively.
 
Solar PV cells
Solar PV cellsSolar PV cells
Solar PV cells
 

Recently uploaded

GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAbdelrhman abooda
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxFurkanTasci3
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 

Recently uploaded (20)

GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptx
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 

Connections b/w active learning and model extraction

  • 1. Exploring Connections between Active Learning and Model Extraction Anmol Dwivedi with credits to the original presentation by the authors at the 2020 USENIX conference*
  • 2. Introduction • Paper: Exploring Connections between Active Learning and Model Extraction • Conference: 29th USENIX Security Symposium • Dates: August 12th-14th, 2020 • Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan
  • 3. Overview 1. Model Extraction from MLaaS • Motivation • Definition 4. Defense Strategies • Data Dependent Defense Strategies • Data Independent Defense Strategies 2. Machine Learning • Passive Learning • Active Learning 3. Evaluate Performance • Linear Models • Non-linear Models 5. Summary & Open Questions
  • 4. Machine Learning as a Service (MLaaS) User Data Local Server MLaaS (Oracle Access) Query Answer Query Interface Advantages: • Scalability • Availability • Monetizability of the model (pay per query regime)
  • 5. Model Extraction Adversary Goals: • White-box Inversion, Membership Inference and Model Inversion attacks • Undermine the pay per query regime Query Objectives: 1. Learn an approximation of the model 2. Use as few queries as possible
  • 6. Example: Equation Solving (ES) Attack for Linear Regression • Strategy for adversary: • Solve a system of linear equations: • Experiment outcome: Use Machine Learning (ML) to solve for strategies for more difficult Hypothesis classes!
  • 7. Machine Learning Passive Learning Active Learning Which setting should the adversary choose?
  • 8. Passive Learning Setting • Learner (adversary) has access to a large labeled dataset D in its entirety • Typically, Probably Approximately Correct (PAC) framework is used to learn f where for algorithm A Algorithm outputs a function within risk tolerance with confidence by using i.i.d data-points Empirical Risk Minimization (ERM) • Problem: Well known inequalities such as Hoeffding’s bound tell us that as the sample complexity grows rapidly!
  • 9. Active Learning Setting • Learner (adversary) has access to a smaller set of labeled instances (lower sample complexity regime) • Learner can actively choose that benefits their query strategy • By intelligently choosing the learner can drastically reduce sample complexity! Learner Oracle Lower Query Complexity Trade-off: Error VS Query Complexity than passive learning Model extraction is similar to Active Learning
  • 10. Example: Half-Space Extraction (d=1) -1 -1 -1 +1 +1 +1 +1 +1 • Passive PAC Learning: • Active Learning:  Intuitive: Simple Binary Search!
  • 11. Active Learning PAC Active Learning Query Synthesis (QS) Active Learning PAC Scenario • Assumes access to the data distribution on (X, Y). • The learner then decides whether to query a given data-point x once given a data set. QS Scenario • Assumes no access to data distribution on (X, Y). • Rather, the instances are generated by learner (even if it might have zero probability of generation). • Query Synthesis (QS) active learning is more suitable for model extraction due to lesser prior knowledge requirement about the data distribution. • Hence, any active learning algorithm in the QS scenario can be used for model extraction! Advancement in Active Learning Threat to MLaaS systems
  • 13. Evaluation: Non-Linear Models (kernel SVMs & Decision Trees) Kernel SVMs (RBF kernel) extraction via the Adaptive Retraining and the EAT (proposed) active learning algorithm Decision Tree extraction via the Path Finding and IWAL (proposed) active learning algorithm Prior work Prior work Proposed Proposed
  • 14. Defense Strategies Link between ML in noisy setting and model extraction Server implements randomized defense strategy D Client Client gets noisy answers from server instead of • Result in more queries than usual • Less accurate model Consequences:
  • 15. Example: Binary Classification Probability that server outputs the wrong answer Upper bound on the probability of a wrong answer
  • 16. Data-Independent Randomization if Defense D is not secure else Server is useless since it outputs incorrect labels most of the time A bound on the number of samples required is
  • 17. Evaluation of Defense Strategies: Data-Independent noise d=64 d=13 Model extraction is possible despite the data independent noise strategy D
  • 18. Data-Dependent Randomization • Use training data to learn a distribution of models! • One possible strategy:
  • 19. Evaluation of Defense Strategies: Data-Dependent noise Model extraction is NOT possible and is secure against this particular Data-Dependent defense active learning strategy!
  • 20. No “free lunch” for defense Model extraction is inevitable • Data independent defense mechanisms fail • Data dependent defense mechanisms fail against passive learning approaches
  • 21.
  • 22. Summary • Connection between Active Learning and Model Extraction • Provide attacks under more realistic scenarios • No free lunch, i.e., model extraction is inevitable
  • 23. Open Questions Query Synthesis Active Learning (QSAL) algorithms for DNNs Determining the model type hosted on the server through “hard label” query interactions Re-use the labeled data to learn another different, hypothesis space Data dependent defense mechanisms for real-valued target functions f