adversarial-attack-from-leakage

Shellmiao f005f52ddb fix: fix file not found or corrupted 1 year ago
data ed4dd791b5 first commit 3 years ago
image ed4dd791b5 first commit 3 years ago
inversefed ed4dd791b5 first commit 3 years ago
output_rec_images 0f05ec2520 added .gitignore 3 years ago
utils f005f52ddb fix: fix file not found or corrupted 1 year ago
.gitignore ed4dd791b5 first commit 3 years ago
README.md 90db721bed Update README.md 3 years ago
demo - CIFAR10.ipynb ed4dd791b5 first commit 3 years ago
demo - VGGFACE2.ipynb ed4dd791b5 first commit 3 years ago
main.py f005f52ddb fix: fix file not found or corrupted 1 year ago

README.md

From Gradient Leakage to Adversarial Attacks in Federated Learning

PDF

Official pytorch implementation of the paper:

Released on June 16, 2020

Description

By utilizing an existing privacy breaking algorithm which inverts gradients of models to reconstruct the input data, the data reconstructed from inverting gradients algorithm reveals the vulnerabilities of models in representation learning.

In this work, we utilize the inverting gradients algorithm proposed in Inverting Gradients - How easy is it to break Privacy in Federated Learning? to reconstruct the data that could lead to possible threats in classification task. By stacking one wrongly predicted image into different batch sizes, then use the stacked images as input of the existing gradients inverting algorithm will result in reconstruction of distorted images that can be correctly predicted by the attacked model.

Prerequisites

Required libraries:

Python>=3.7
pytorch=1.5.0
torchvision=0.6.0

Code

python main.py --model "resnet18" --data "cifar10" stack_size 4 -ls 1001,770,123 --save True --gpu True

Implementation for ResNet-18 trained with CIFAR10 can be found HERE and with VGGFACE2 can be found HERE

Quick reproduction for CIFAR10 dataset:

You can download pretrained model from HERE then replace the torchvision models.

Reference:

Citation

If you find this work useful for your research, please cite

@inproceedings{Gleakage,
  title={From Gradient Leakage To Adversarial Attacks In Federated Learning},
  author={Lim, Jia Qi and Chan, Chee Seng},
  booktitle={2021 IEEE International Conference on Image Processing (ICIP)},
  year={2021},
}

Feedback

Suggestions and opinions on this work (both positive and negative) are greatly welcomed. Please contact the authors by sending an email to jiaqi0602 at gmail.com or cs.chan at um.edu.my.

License and Copyright

The project is open source under BSD-3 license (see the LICENSE file).

©2021 Universiti Malaya.