Bounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (2024)

Bounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (2)

Advanced Search

nips

research-article

Free Access

  • Authors:
  • Kiwan Maeng Penn State University

    Penn State University

    View Profile

    ,
  • Chuan Guo FAIR, Meta

    FAIR, Meta

    View Profile

    ,
  • Sanjay Kariyappa Georgia Institute of Technology

    Georgia Institute of Technology

    View Profile

    ,
  • G. Edward Suh FAIR, Meta & Cornell University

    FAIR, Meta & Cornell University

    View Profile

NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing SystemsDecember 2023Article No.: 2261Pages 51904–51925

Published:30 May 2024Publication History

  • 0citation
  • 0
  • Downloads

Metrics

Total Citations0Total Downloads0

Last 12 Months0

Last 6 weeks0

  • Get Citation Alerts

    New Citation Alert added!

    This alert has been successfully added and will be sent to:

    You will be notified whenever a record that you have chosen has been cited.

    To manage your alert preferences, click on the button below.

    Manage my Alerts

    New Citation Alert!

    Please log in to your account

  • Publisher Site

NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing Systems

Bounding the invertibility of privacy-preserving instance encoding using fisher information

Pages 51904–51925

PreviousChapterNextChapter

Bounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (3)

ABSTRACT

Privacy-preserving instance encoding aims to encode raw data into feature vectors without revealing their privacy-sensitive information. When designed properly, these encodings can be used for downstream ML applications such as training and inference with limited privacy risk. However, the vast majority of existing schemes do not theoretically justify that their encoding is non-invertible, and their privacy-enhancing properties are only validated empirically against a limited set of attacks. In this paper, we propose a theoretically-principled measure for the invertibility of instance encoding based on Fisher information that is broadly applicable to a wide range of popular encoders. We show that dFIL can be used to bound the invertibility of encodings both theoretically and empirically, providing an intuitive interpretation of the privacy of instance encoding.

Skip Supplemental Material Section

Supplemental Material

Available for Download

pdf

3666122.3668383_supp.pdf (3.4 MB)

Supplemental material.

References

  1. Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. Deep learning with differential privacy. In Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and Shai Halevi, editors, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pages 308-318. ACM, 2016.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (4)Digital Library
  2. Efe Aras, Kuan-Yun Lee, Ashwin Pananjady, and Thomas A. Courtade. A family of bayesian cramér-rao bounds, and consequences for log-concave priors. In IEEE International Symposium on Information Theory, ISIT 2019, Paris, France, July 7-12, 2019, pages 2699-2703. IEEE, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (6)Digital Library
  3. Shahab Asoodeh, Mario Díaz, Fady Alajaji, and Tamás Linder. Estimation efficiency under privacy constraints. IEEE Trans. Inf. Theory, 65(3):1512-1534, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (8)Cross Ref
  4. Amin Banitalebi-Dehkordi, Naveen Vedula, Jian Pei, Fei Xia, Lanjun Wang, and Yong Zhang. Auto-split: a general framework of collaborative edge-cloud ai. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pages 2543-2553, 2021.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (10)Digital Library
  5. Martín Bertrán, Natalia Martínez, Afroditi Papadaki, Qiang Qiu, Miguel R. D. Rodrigues, Galen Reeves, and Guillermo Sapiro. Adversarially learned representations for information obfuscation and inference. In Kamalika Chaudhuri and Ruslan Salakhutdinov, editors, Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9-15 June 2019, Long Beach, California, USA, volume 97 of Proceedings of Machine Learning Research, pages 614-623. PMLR, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (12)
  6. Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Shuang Song, Abhradeep Thakurta, and Florian Tramèr. An attack on instahide: Is private learning possible with instance encoding? CoRR, abs/2011.05315, 2020.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (13)
  7. Nicholas Carlini, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Florian Tramèr. Neuracrypt is not private. CoRR, abs/2108.07256, 2021.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (14)
  8. Konstantinos Chatzikokolakis, Miguel E. Andrés, Nicolás Emilio Bordenabe, and Catuscia Palamidessi. Broadening the scope of differential privacy using metrics. In Emiliano De Cristofaro and Matthew K. Wright, editors, Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings, volume 7981 of Lecture Notes in Computer Science, pages 82-102. Springer, 2013.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (15)Cross Ref
  9. Jeremy M. Cohen, Elan Rosenfeld, and J. Zico Kolter. Certified adversarial robustness via randomized smoothing. In Kamalika Chaudhuri and Ruslan Salakhutdinov, editors, Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9-15 June 2019, Long Beach, California, USA, volume 97 of Proceedings of Machine Learning Research, pages 1310-1320. PMLR, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (17)
  10. Li Deng. The mnist database of handwritten digit images for machine learning research. IEEE Signal Processing Magazine, 29(6):141-142, 2012.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (18)Cross Ref
  11. Xin Dong, Barbara De Salvo, Meng Li, Chiao Liu, Zhongnan Qu, HT Kung, and Ziyun Li. Splitnets: Designing neural architectures for efficient distributed computing on head-mounted systems. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 12559-12569, 2022.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (20)Cross Ref
  12. Alexey Dosovitskiy and Thomas Brox. Inverting visual representations with convolutional networks. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016, pages 4829-4837. IEEE Computer Society, 2016.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (22)Cross Ref
  13. Flávio du Pin Calmon and Nadia Fawaz. Privacy against statistical inference. In 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012, Allerton Park & Retreat Center, Monticello, IL, USA, October 1-5, 2012, pages 1401-1408. IEEE, 2012.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (24)Cross Ref
  14. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference, pages 265-284. Springer, 2006.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (26)Digital Library
  15. Cynthia Dwork, Aaron Roth, et al. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science, 9(3-4):211-407, 2014.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (28)Digital Library
  16. Liyue Fan. Image pixelization with differential privacy. In Florian Kerschbaum and Stefano Paraboschi, editors, Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings, volume 10980 of Lecture Notes in Computer Science, pages 148-162. Springer, 2018.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (30)Digital Library
  17. Liyue Fan. Differential privacy for image publication. In Theory and Practice of Differential Privacy (TPDP) Workshop, volume 1, page 6, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (32)
  18. Farhad Farokhi and Henrik Sandberg. Fisher information as a measure of privacy: Preserving privacy of households with smart meters using batteries. IEEE Trans. Smart Grid, 9(5):4726-4734, 2018.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (33)Cross Ref
  19. Richard D Gill and Boris Y Levit. Applications of the van trees inequality: a bayesian cramér-rao bound. Bernoulli, pages 59-79, 1995.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (35)
  20. Chuan Guo, Brian Karrer, Kamalika Chaudhuri, and Laurens van der Maaten. Bounding training data reconstruction in private (deep) learning. In Kamalika Chaudhuri, Stefanie Jegelka, Le Song, Csaba Szepesvári, Gang Niu, and Sivan Sabato, editors, International Conference on Machine Learning, ICML 2022, 17-23 July 2022, Baltimore, Maryland, USA, volume 162 of Proceedings of Machine Learning Research, pages 8056-8071. PMLR, 2022.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (36)
  21. Chuan Guo, Alexandre Sablayrolles, and Maziar Sanjabi. Analyzing privacy leakage in machine learning via multiple hypothesis testing: A lesson from fano. arXiv preprint arXiv:2210.13662, 2022.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (37)
  22. Awni Hannun, Chuan Guo, and Laurens van der Maaten. Measuring data leakage in machine-learning models with fisher information. In Uncertainty in Artificial Intelligence, pages 760-770. PMLR, 2021.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (38)
  23. Andrew Hard, Kanishka Rao, Rajiv Mathews, Swaroop Ramaswamy, Françoise Beaufays, Sean Augenstein, Hubert Eichner, Chloé Kiddon, and Daniel Ramage. Federated learning for mobile keyboard prediction. arXiv preprint arXiv:1811.03604, 2018.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (39)
  24. F. Maxwell Harper and Joseph A. Konstan. The movielens datasets: History and context. ACM Trans. Interact. Intell. Syst., 5(4):19:1-19:19, 2016.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (40)Digital Library
  25. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016, pages 770-778. IEEE Computer Society, 2016.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (42)Cross Ref
  26. Xiangnan He, Lizi Liao, Hanwang Zhang, Liqiang Nie, Xia Hu, and Tat-Seng Chua. Neural collaborative filtering. In Rick Barrett, Rick Cummings, Eugene Agichtein, and Evgeniy Gabrilovich, editors, Proceedings of the 26th International Conference on World Wide Web, WWW 2017, Perth, Australia, April 3-7, 2017, pages 173-182. ACM, 2017.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (44)
  27. Zecheng He, Tianwei Zhang, and Ruby B. Lee. Model inversion attacks against collaborative inference. In David Balenson, editor, Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019, pages 148-162. ACM, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (45)
  28. Zecheng He, Tianwei Zhang, and Ruby B Lee. Attacking and protecting data privacy in edge-cloud collaborative inference systems. IEEE Internet of Things Journal, 8(12):9706-9716, 2020.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (46)Cross Ref
  29. Dan Hendrycks and Kevin Gimpel. Gaussian error linear units (gelus). arXiv preprint arXiv:1606.08415, 2016.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (48)
  30. Jonathan Ho, Ajay Jain, and Pieter Abbeel. Denoising diffusion probabilistic models. In Hugo Larochelle, Marc'Aurelio Ranzato, Raia Hadsell, Maria-Florina Balcan, and Hsuan-Tien Lin, editors, Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual, 2020.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (49)
  31. Alain Horé and Djemel Ziou. Image quality metrics: PSNR vs. SSIM. In 20th International Conference on Pattern Recognition, ICPR 2010, Istanbul, Turkey, 23-26 August 2010, pages 2366-2369. IEEE Computer Society, 2010.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (50)Digital Library
  32. Hsiang Hsu, Shahab Asoodeh, and Flávio P. Calmon. Obfuscation via information density estimation. In Silvia Chiappa and Roberto Calandra, editors, The 23rd International Conference on Artificial Intelligence and Statistics, AISTATS 2020, 26-28 August 2020, Online [Palermo, Sicily, Italy], volume 108 of Proceedings of Machine Learning Research, pages 906-917. PMLR, 2020.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (52)
  33. Hsiang Hsu, Natalia Martinez, Martin Bertran, Guillermo Sapiro, and Flavio P Calmon. A survey on statistical, information, and estimation—theoretic views on privacy. IEEE BITS the Information Theory Magazine, 1(1):45-56, 2021.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (53)Cross Ref
  34. Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, and Ram Rajagopal. Generative adversarial privacy. CoRR, abs/1807.05306, 2018.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (55)
  35. Yangsibo Huang, Zhao Song, Kai Li, and Sanjeev Arora. Instahide: Instance-hiding schemes for private distributed learning. In Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13-18 July 2020, Virtual Event, volume 119 of Proceedings of Machine Learning Research, pages 4507-4518. PMLR, 2020.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (56)
  36. Aapo Hyvärinen and Peter Dayan. Estimation of non-normalized statistical models by score matching. Journal of Machine Learning Research, 6(4), 2005.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (57)
  37. Jacob Imola, Shiva Prasad Kasiviswanathan, Stephen White, Abhinav Aggarwal, and Nathanael Teissier. Balancing utility and scalability in metric differential privacy. In James Cussens and Kun Zhang, editors, Uncertainty in Artificial Intelligence, Proceedings of the Thirty-Eighth Conference on Uncertainty in Artificial Intelligence, UAI 2022, 1-5 August 2022, Eindhoven, The Netherlands, volume 180 of Proceedings of Machine Learning Research, pages 885-894. PMLR, 2022.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (58)
  38. Ibrahim Issa, Aaron B. Wagner, and Sudeep Kamath. An operational approach to information leakage. IEEE Trans. Inf. Theory, 66(3):1625-1657, 2020.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (59)Cross Ref
  39. Bargav Jayaraman and David Evans. Evaluating differentially private machine learning in practice. In 28th USENIX Security Symposium (USENIX Security 19), pages 1895-1912, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (61)
  40. Yiping Kang, Johann Hauswald, Cao Gao, Austin Rovinski, Trevor Mudge, Jason Mars, and Lingjia Tang. Neurosurgeon: Collaborative intelligence between the cloud and mobile edge. ACM SIGARCH Computer Architecture News, 45(1):615-629, 2017.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (62)Digital Library
  41. Steven M Kay. Fundamentals of statistical signal processing: estimation theory. Prentice-Hall, Inc., 1993.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (64)Digital Library
  42. Alex Krizhevsky, Geoffrey Hinton, et al. Learning multiple layers of features from tiny images. 2009.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (66)
  43. Matt Kusner, Yu Sun, Nicholas Kolkin, and Kilian Weinberger. From word embeddings to document distances. In International conference on machine learning, pages 957-966. PMLR, 2015.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (67)Digital Library
  44. Mathias Lécuyer, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, and Suman Jana. Certified robustness to adversarial examples with differential privacy. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019, pages 656-672. IEEE, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (69)Cross Ref
  45. Jingtao Li, Adnan Siraj Rakin, Xing Chen, Zhezhi He, Deliang Fan, and Chaitali Chakrabarti. Ressfl: A resistance transfer framework for defending model inversion attack in split federated learning. In IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2022, New Orleans, LA, USA, June 18-24, 2022, pages 10184-10192. IEEE, 2022.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (71)Cross Ref
  46. Meng Li, Liangzhen Lai, Naveen Suda, Vikas Chandra, and David Z Pan. Privynet: A flexible framework for privacy-preserving deep neural network training. arXiv preprint arXiv:1709.06161, 2017.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (73)
  47. Yingzhen Li and Richard E Turner. Gradient estimators for implicit models. arXiv preprint arXiv:1705.07107, 2017.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (74)
  48. Bo Liu, Ming Ding, Hanyu Xue, Tianqing Zhu, Dayong Ye, Li Song, and Wanlei Zhou. Dp-image: Differential privacy for image data in feature space. CoRR, abs/2103.07073, 2021.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (75)
  49. Aravindh Mahendran and Andrea Vedaldi. Understanding deep image representations by inverting them. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015, pages 5188-5196. IEEE Computer Society, 2015.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (76)Cross Ref
  50. Luca Melis, Congzheng Song, Emiliano De Cristofaro, and Vitaly Shmatikov. Exploiting unintended feature leakage in collaborative learning. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019, pages 691-706. IEEE, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (78)Cross Ref
  51. Fatemehsadat Mireshghallah, Mohammadkazem Taram, Prakash Ramrakhyani, Ali Jalali, Dean Tullsen, and Hadi Esmaeilzadeh. Shredder: Learning noise distributions to protect inference privacy. In Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems, pages 3-18, 2020.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (80)Digital Library
  52. Ilya Mironov. Rényi differential privacy. In 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pages 263-275. IEEE Computer Society, 2017.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (82)Cross Ref
  53. Dario Pasquini, Giuseppe Ateniese, and Massimo Bernaschi. Unleashing the tiger: Inference attacks on split learning. In Yongdae Kim, Jong Kim, Giovanni Vigna, and Elaine Shi, editors, CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 -19, 2021, pages 2113-2129. ACM, 2021.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (84)Digital Library
  54. Huy Phan. Pytorch models trained on cifar-10 dataset. https://github.com/huyvnphan/PyTorch_CIFAR10, 2013.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (86)
  55. Maarten G Poirot, Praneeth Vepakomma, Ken Chang, Jayashree Kalpathy-Cramer, Rajiv Gupta, and Ramesh Raskar. Split learning for collaborative deep learning in healthcare. arXiv preprint arXiv:1912.12115, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (87)
  56. Victor Sanh, Lysandre Debut, Julien Chaumond, and Thomas Wolf. Distilbert, a distilled version of BERT: smaller, faster, cheaper and lighter. CoRR, abs/1910.01108, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (88)
  57. Yang Song, Sahaj Garg, Jiaxin Shi, and Stefano Ermon. Sliced score matching: A scalable approach to density and score estimation. In Amir Globerson and Ricardo Silva, editors, Proceedings of the Thirty-Fifth Conference on Uncertainty in Artificial Intelligence, UAI 2019, Tel Aviv, Israel, July 22-25, 2019, volume 115 of Proceedings of Machine Learning Research, pages 574-584. AUAI Press, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (89)
  58. Stanford. [TinylmageNet download link]. http://cs231n.stanford.edu/tiny-imagenet-200.zip, 2023.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (90)
  59. Chandra Thapa, Mahawaga Arachchige Pathum Chamikara, Seyit Camtepe, and Lichao Sun. Splitfed: When federated learning meets split learning. In Thirty-Sixth AAAI Conference on Artificial Intelligence, AAAI 2022, Thirty-Fourth Conference on Innovative Applications of Artificial Intelligence, IAAI 2022, The Twelveth Symposium on Educational Advances in Artificial Intelligence, EAAI 2022 Virtual Event, February 22 - March 1, 2022, pages 8485-8493. AAAI Press, 2022.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (91)
  60. Tom Titcombe, Adam J Hall, Pavlos Papadopoulos, and Daniele Romanini. Practical defences against model inversion attacks for split neural networks. arXiv preprint arXiv:2104.05743, 2021.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (92)
  61. Dmitry Ulyanov, Andrea Vedaldi, and Victor S. Lempitsky. Deep image prior. In 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2018, Salt Lake City, UT, USA, June 18-22, 2018, pages 9446-9454. Computer Vision Foundation / IEEE Computer Society, 2018.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (93)
  62. Harry L Van Trees. Detection, estimation, and modulation theory, part I: detection, estimation, and linear modulation theory. John Wiley & Sons, 2004.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (94)
  63. Praneeth Vepakomma, Otkrist Gupta, Tristan Swedish, and Ramesh Raskar. Split learning for health: Distributed deep learning without sharing raw patient data. arXiv preprint arXiv:1812.00564, 2018.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (95)
  64. Praneeth Vepakomma, Abhishek Singh, Otkrist Gupta, and Ramesh Raskar. Nopeek: Information leakage reduction to share activations in distributed deep learning. In 2020 International Conference on Data Mining Workshops (ICDMW), pages 933-942. IEEE, 2020.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (96)Cross Ref
  65. Praneeth Vepakomma, Abhishek Singh, Emily Zhang, Otkrist Gupta, and Ramesh Raskar. Nopeek-infer: Preventing face reconstruction attacks in distributed inference after on-premise training. In 2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021), pages 1-8. IEEE, 2021.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (98)Digital Library
  66. Aladin Virmaux and Kevin Scaman. Lipschitz regularity of deep neural networks: analysis and efficient estimation. In Samy Bengio, Hanna M. Wallach, Hugo Larochelle, Kristen Grauman, Nicolò Cesa-Bianchi, and Roman Garnett, editors, Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montréal, Canada, pages 3839-3848, 2018.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (100)
  67. Patrick von Platen. google/ddpm-cifar10-32. https://huggingface.co/google/ddpm-cifar10-32, 2022.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (101)
  68. Alex Wang, Amanpreet Singh, Julian Michael, Felix Hill, Omer Levy, and Samuel R. Bowman. GLUE: A multi-task benchmark and analysis platform for natural language understanding. In 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6-9, 2019. OpenReview.net, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (102)
  69. Zhou Wang and Alan C Bovik. A universal image quality index. IEEE signal processing letters, 9(3):81-84, 2002.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (103)
  70. Liyao Xiang, Hao Zhang, Haotian Ma, Yifan Zhang, Jie Ren, and Quanshi Zhang. Interpretable complex-valued neural networks for privacy protection. In 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, April 26-30, 2020. OpenReview.net, 2020.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (104)
  71. Hanshen Xiao and Srinivas Devadas. Dauntless: Data augmentation and uniform transformation for learning with scalability and security. IACR Cryptol. ePrint Arch., page 201, 2021.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (105)
  72. Hanshen Xiao and Srinivas Devadas. PAC privacy: Automatic privacy measurement and control of data processing. In Helena Handschuh and Anna Lysyanskaya, editors, Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part II, volume 14082 of Lecture Notes in Computer Science, pages 611-644. Springer, 2023.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (106)Digital Library
  73. Adam Yala, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Ken R. Duffy, Manya Ghobadi, Tommi S. Jaakkola, Vinod Vaikuntanathan, Regina Barzilay, and Muriel Médard. Neuracrypt: Hiding private health data via random neural networks for public training. CoRR, abs/2106.02484, 2021.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (108)
  74. Qiang Yang, Yang Liu, Tianjian Chen, and Yongxin Tong. Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST), 10(2):1-19, 2019.Google ScholarBounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (109)

Cited By

View all

Bounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (110)

    Recommendations

    • Privacy-Preserving Data Publishing: An Overview

      Read More

    • Privacy-Preserving Sharing of Sensitive Information

      Privacy-preserving sharing of sensitive information (PPSSI) is motivated by the increasing need for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze,...

      Read More

    • Multi-level privacy preserving data publishing

      Policedata is an important source of social media data and can be regarded as a technical assistance to increase government accountability and transparency. Notably, it contains large amounts of personal private information that should be preserved ...

      Read More

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    Get this Publication

    • Information
    • Contributors
    • Published in

      Bounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (111)

      NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing Systems

      December 2023

      80772 pages

      • Editors:
      • A. Oh,
      • T. Naumann,
      • A. Globerson,
      • K. Saenko,
      • M. Hardt,
      • S. Levine

      Copyright © 2023 Neural Information Processing Systems Foundation, Inc.

      Sponsors

        In-Cooperation

          Publisher

          Curran Associates Inc.

          Red Hook, NY, United States

          Publication History

          • Published: 30 May 2024

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Conference

          Funding Sources

          • Bounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (118)

            Other Metrics

            View Article Metrics

          • Bibliometrics
          • Citations0
          • Article Metrics

            • Total Citations

              View Citations
            • Total Downloads

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0

            Other Metrics

            View Author Metrics

          • Cited By

            This publication has not been cited yet

          Digital Edition

          View this article in digital edition.

          View Digital Edition

          • Figures
          • Other

            Close Figure Viewer

            Browse AllReturn

            Caption

            View Table of Contents

            Export Citations

              Your Search Results Download Request

              We are preparing your search results for download ...

              We will inform you here when the file is ready.

              Download now!

              Your Search Results Download Request

              Your file of search results citations is now ready.

              Download now!

              Your Search Results Download Request

              Your search export query has expired. Please try again.

              Bounding the invertibility of privacy-preserving instance encoding using fisher information | Proceedings of the 37th International Conference on Neural Information Processing Systems (2024)
              Top Articles
              Latest Posts
              Article information

              Author: Tuan Roob DDS

              Last Updated:

              Views: 6043

              Rating: 4.1 / 5 (42 voted)

              Reviews: 89% of readers found this page helpful

              Author information

              Name: Tuan Roob DDS

              Birthday: 1999-11-20

              Address: Suite 592 642 Pfannerstill Island, South Keila, LA 74970-3076

              Phone: +9617721773649

              Job: Marketing Producer

              Hobby: Skydiving, Flag Football, Knitting, Running, Lego building, Hunting, Juggling

              Introduction: My name is Tuan Roob DDS, I am a friendly, good, energetic, faithful, fantastic, gentle, enchanting person who loves writing and wants to share my knowledge and understanding with you.