当前位置: 首页 > news >正文

《Towards Black-Box Membership Inference Attack for Diffusion Models》论文笔记

《Towards Black-Box Membership Inference Attack for Diffusion Models》

Abstract

  1. 识别艺术品是否用于训练扩散模型的挑战,重点是人工智能生成的艺术品中的成员推断攻击——copyright protection
  2. 不需要访问内部模型组件的新型黑盒攻击方法
  3. 展示了在评估 DALL-E 生成的数据集方面的卓越性能。

作者主张

previous methods are not yet ready for copyright protection in diffusion models.

Contributions(文章里有三点,我觉得只有两点)

  1. ReDiffuse:using the model’s variation API to alter an image and compare it with the original one.
  2. A new MIA evaluation dataset:use the image titles from LAION-5B as prompts for DALL-E’s API [31] to generate images of the same contents but different styles.

Algorithm Design

target model:DDIM

为什么要强行引入一个版权保护的概念???

定义black-box variation API

x ^ = V θ ( x , t ) \hat{x}=V_{\theta}(x,t) x^=Vθ(x,t)

细节如下:

image-20240714153919091

image-20240714154002587

总结为: x x x加噪变为 x t x_t xt,再通过DDIM连续降噪变为 x ^ \hat{x} x^

intuition

Our key intuition comes from the reverse SDE dynamics in continuous diffusion models.

one simplified form of the reverse SDE (i.e., the denoise step)
X t = ( X t / 2 − ∇ x log ⁡ p ( X t ) ) + d W t , t ∈ [ 0 , T ] (3) X_t=(X_t/2-\nabla_x\log p(X_t))+dW_t,t\in[0,T]\tag{3} Xt=(Xt/2xlogp(Xt))+dWt,t[0,T](3)

The key guarantee is that when the score function is learned for a data point x, then the reconstructed image x ^ i \hat{x}_i x^i is an unbiased estimator of x x x.(算是过拟合的另一种说法吧)

Hence,averaging over multiple independent samples x ^ i \hat{x}_i x^i would greatly reduce the estimation error (see Theorem 1).

On the other hand, for a non-member image x ′ x' x, the unbiasedness of the denoised image is not guaranteed.

image-20240715221809436

details of algorithm:

  1. independently apply the black-box variation API n times with our target image x as input
  2. average the output images
  3. compare the average result x ^ \hat{x} x^ with the original image.

evaluate the difference between the images using an indicator function:
f ( x ) = 1 [ D ( x , x ^ ) < τ ] f(x)=1[D(x,\hat{x})<\tau] f(x)=1[D(x,x^)<τ]
A sample is classified to be in the training set if D ( x , x ^ ) D(x,\hat{x}) D(x,x^) is smaller than a threshold τ \tau τ ( D ( x , x ^ ) D(x,\hat{x}) D(x,x^) represents the difference between the two images)

ReDiffuse

image-20240715201536961

image-20240715212401773
Theoretical Analysis

什么是sampling interval???

MIA on Latent Diffusion Models

泛化到latent diffusion model,即Stable Diffusion

ReDiffuse+

variation API for stable diffusion is different from DDIM, as it includes the encoder-decoder process.
z = E n c o d e r ( x ) , z t = α ‾ t z + 1 − α ‾ t ϵ , z ^ = Φ θ ( z t , 0 ) , x ^ = D e c o d e r ( z ^ ) (4) z={\rm Encoder}(x),\quad z_t=\sqrt{\overline{\alpha}_t}z+\sqrt{1-\overline{\alpha}_t}\epsilon,\quad \hat{z}=\Phi_{\theta}(z_t,0),\quad \hat{x}={\rm Decoder}(\hat{z})\tag{4} z=Encoder(x),zt=αt z+1αt ϵ,z^=Φθ(zt,0),x^=Decoder(z^)(4)
modification of the algorithm

independently adding random noise to the original image twice and then comparing the differences between the two restored images x ^ 1 \hat{x}_1 x^1 and x ^ 2 \hat{x}_2 x^2:
f ( x ) = 1 [ D ( x ^ 1 , x ^ 2 ) < τ ] f(x)=1[D(\hat{x}_1,\hat{x}_2)<\tau] f(x)=1[D(x^1,x^2)<τ]

Experiments

Evaluation Metrics
  1. AUC
  2. ASR
  3. TPR@1%FPR
same experiment’s setup in previous papers [5, 18].
target modelDDIMStable Diffusion
version《Are diffusion models vulnerable to membership inference attacks?》original:stable diffusion-v1-5 provided by Huggingface
datasetCIFAR10/100,STL10-Unlabeled,Tiny-Imagenetmember set:LAION-5B,corresponding 500 images from LAION-5;non-member set:COCO2017-val,500 images from DALL-E3
T10001000
k10010
baseline methods[5]Are diffusion models vulnerable to membership inference attacks?: SecMIA[18]An efficient membership inference attack for the diffusion model by proximal initialization.[28]Membership inference attacks against diffusion models
publicationInternational Conference on Machine LearningarXiv preprint2023 IEEE Security and Privacy Workshops (SPW)
Ablation Studies
  1. The impact of average numbers
  2. The impact of diffusion steps
  3. The impact of sampling intervals

相关文章:

  • 北京网站建设多少钱?
  • 辽宁网页制作哪家好_网站建设
  • 高端品牌网站建设_汉中网站制作
  • 【CMU博士论文】结构化推理增强大语言模型(Part 0)
  • 上海理工大学24计算机考研考情分析!初复试分值比55:45,复试逆袭人数不算多!
  • 发布支持TS的npm包
  • 仅两家!云原生向量数据库 PieCloudVector 全项通过信通院「可信数据库」评测
  • 全国媒体邀约,主流媒体到场出席采访报道
  • 20240718每日后端------------kafka VS RabbitMQ:选择正确的消息代理
  • Flutter应用开发:掌握StatefulWidget的实用技巧
  • 字节面试:如何让单机下Netty支持百万长连接?
  • Spring MVC-什么是Spring MVC?
  • 全国产服务器主板:搭载飞腾FT2000+/64处理器的高性能加固服务器
  • 【ASP.NET网站传值问题】“object”不包含“GetEnumerator”的公共定义,因此 foreach 语句不能作用于“object”类型的变量等
  • FastAPI 学习之路(五十九)封装统一的json返回处理工具
  • .NET C# 使用 iText 生成PDF
  • JS中对象的方括号[]和点.【对象属性的访问和设置】
  • 如何在项目中打印sql和执行的时间
  • 2017 前端面试准备 - 收藏集 - 掘金
  • CSS 三角实现
  • docker-consul
  • HashMap ConcurrentHashMap
  • JavaScript 一些 DOM 的知识点
  • Laravel 实践之路: 数据库迁移与数据填充
  • MySQL QA
  • Stream流与Lambda表达式(三) 静态工厂类Collectors
  • UMLCHINA 首席专家潘加宇鼎力推荐
  • vue数据传递--我有特殊的实现技巧
  • 浅析微信支付:申请退款、退款回调接口、查询退款
  • 算法-插入排序
  • const的用法,特别是用在函数前面与后面的区别
  • 积累各种好的链接
  • ​力扣解法汇总946-验证栈序列
  • #《AI中文版》V3 第 1 章 概述
  • #Datawhale AI夏令营第4期#AIGC文生图方向复盘
  • #传输# #传输数据判断#
  • $Django python中使用redis, django中使用(封装了),redis开启事务(管道)
  • (1)Android开发优化---------UI优化
  • (a /b)*c的值
  • (delphi11最新学习资料) Object Pascal 学习笔记---第7章第3节(封装和窗体)
  • (k8s)Kubernetes 从0到1容器编排之旅
  • (k8s中)docker netty OOM问题记录
  • (Ruby)Ubuntu12.04安装Rails环境
  • (vue)el-cascader级联选择器按勾选的顺序传值,摆脱层级约束
  • (附源码)ssm智慧社区管理系统 毕业设计 101635
  • (亲测成功)在centos7.5上安装kvm,通过VNC远程连接并创建多台ubuntu虚拟机(ubuntu server版本)...
  • ******IT公司面试题汇总+优秀技术博客汇总
  • .Family_物联网
  • .Net - 类的介绍
  • .NET Core Web APi类库如何内嵌运行?
  • .NET Core中的时区转换问题
  • .NET Reactor简单使用教程
  • .NET 的静态构造函数是否线程安全?答案是肯定的!
  • .NET企业级应用架构设计系列之应用服务器
  • .net知识和学习方法系列(二十一)CLR-枚举
  • @NestedConfigurationProperty 注解用法
  • [ C++ ] 类和对象( 下 )
  • [20170713] 无法访问SQL Server