Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    A Performance Study of Membership Inference Attacks on Different Machine Learning Algorithms

    Jumana Alsubhi1, Abdulrahman Gharawi1, Mohammad Alahmadi2,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 193-200, 2021, DOI:10.32604/jihpp.2021.027871

    Abstract Nowadays, machine learning (ML) algorithms cannot succeed without the availability of an enormous amount of training data. The data could contain sensitive information, which needs to be protected. Membership inference attacks attempt to find out whether a target data point is used to train a certain ML model, which results in security and privacy implications. The leakage of membership information can vary from one machine-learning algorithm to another. In this paper, we conduct an empirical study to explore the performance of membership inference attacks against three different machine learning algorithms, namely, K-nearest neighbors, random forest, support vector machine, and logistic… More >

  • Open Access

    ARTICLE

    Towards Securing Machine Learning Models Against Membership Inference Attacks

    Sana Ben Hamida1,2, Hichem Mrabet3,4, Sana Belguith5,*, Adeeb Alhomoud6, Abderrazak Jemai7

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4897-4919, 2022, DOI:10.32604/cmc.2022.019709

    Abstract From fraud detection to speech recognition, including price prediction, Machine Learning (ML) applications are manifold and can significantly improve different areas. Nevertheless, machine learning models are vulnerable and are exposed to different security and privacy attacks. Hence, these issues should be addressed while using ML models to preserve the security and privacy of the data used. There is a need to secure ML models, especially in the training phase to preserve the privacy of the training datasets and to minimise the information leakage. In this paper, we present an overview of ML threats and vulnerabilities, and we highlight current progress… More >

Displaying 1-10 on page 1 of 2. Per Page