Repository landing page

We are not able to resolve this OAI Identifier to the repository landing page. If you are the repository manager for this record, please head to the Dashboard and adjust the settings.

Universal Multi-Party Poisoning Attacks

Abstract

In this work, we demonstrate universal multi-party poisoning attacks that adapt and apply to any multi-party learning process with arbitrary interaction pattern between the parties. More generally, we introduce and study (k,p)(k,p)-poisoning attacks in which an adversary controls k∈[m]k\in[m] of the parties, and for each corrupted party PiP_i, the adversary submits some poisoned data T2˘7iT\u27_i on behalf of PiP_i that is still (1βˆ’p)(1-p)-close to the correct data TiT_i (e.g., 1βˆ’p1-p fraction of T2˘7iT\u27_i is still honestly generated). We prove that for any bad property BB of the final trained hypothesis hh (e.g., hh failing on a particular test example or having large risk) that has an arbitrarily small constant probability of happening without the attack, there always is a (k,p)(k,p)-poisoning attack that increases the probability of BB from ΞΌ\mu to by ΞΌ1βˆ’pβ‹…k/m=ΞΌ+Ξ©(pβ‹…k/m)\mu^{1-p \cdot k/m} = \mu + \Omega(p \cdot k/m). Our attack only uses clean labels, and it is online. More generally, we prove that for any bounded function f(x1,…,xn)∈[0,1]f(x_1,\dots,x_n) \in [0,1] defined over an nn-step random process x=(x1,…,xn)x = (x_1,\dots,x_n), an adversary who can override each of the nn blocks with \emph{even dependent} probability pp can increase the expected output by at least Ξ©(pβ‹…Var[f(x)])\Omega(p \cdot \mathrm{Var}[f(x)])

Similar works

This paper was published in Cryptology ePrint Archive.

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.