Gradient Inversion of Text-Modal Data in Distributed Learning

被引:0
作者
Ye, Zipeng [1 ]
Luo, Wenjian [1 ,2 ]
Zhou, Qi [1 ]
Tang, Yubo [1 ]
Zhu, Zhenqian [1 ]
Shi, Yuhui [3 ]
Jia, Yan [1 ,2 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Guangdong Prov Key Lab Novel Secur Intelligence Te, Shenzhen 518055, Guangdong, Peoples R China
[2] Peng Cheng Lab, Shenzhen 518055, Guangdong, Peoples R China
[3] Southern Univ Sci & Technol, Sch Comp Sci & Engn, Shenzhen 518055, Guangdong, Peoples R China
关键词
Image reconstruction; Data models; Transformers; Distance learning; Data privacy; Computer aided instruction; Training data; Distributed databases; Training; Mathematical models; Distributed learning; privacy preserving; language model; Transformer; gradient inversion attack;
D O I
10.1109/TIFS.2024.3522792
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Gradient inversion attacks (GIAs) pose significant challenges to the privacy-preserving paradigm of distributed learning. These attacks employ carefully designed strategies to reconstruct victim's private training data from their shared gradients. However, existing work mainly focuses on attacks and defenses for image-modal data, while the study for text-modal data remains scarce. Furthermore, the performance of the limited attack researches on text-modal data is also unsatisfactory, which can be partially attributed to the finer granularity of text data compared to image. To bridge the existing research gap, we propose a high-fidelity attack method tailored for Transformer-based language models (LMs). In our method, we initially reconstruct the label space of the victim's training data by leveraging the characteristics of the Transformer architecture. After that, we propose a shallow-to-deep paradigm to facilitate gradient matching, which can significantly improve the attack performance. Furthermore, we develop a weighted surrogate loss that resolves the consistent deviation issue present in current attack researches. A substantial number of experiments on Transformer-based LMs (e.g., Bert and GPT) demonstrate that our attack is competitive and significantly outperforms existing methods. In the final part of this paper, we investigate the influence of the inherent position embedding module within the Transformer architecture on attack performance, and based on the analysis results, we propose a countermeasure to alleviate part of the privacy leakage issue in distributed learning.
引用
收藏
页码:928 / 943
页数:16
相关论文
共 67 条
  • [1] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [2] Anandarajan M, 2019, TEXT PREPROCESSING, P45
  • [3] [Anonymous], 2008, P 21 INT C NEURAL IN
  • [4] Federated Learning for Healthcare: Systematic Review and Architecture Proposal
    Antunes, Rodolfo Stoffel
    da Costa, Cristiano Andre
    Kuederle, Arne
    Yari, Imrana Abdullahi
    Eskofier, Bjoern
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2022, 13 (04)
  • [5] Balunovic M, 2022, ADV NEUR IN
  • [6] Practical Secure Aggregation for Privacy-Preserving Machine Learning
    Bonawitz, Keith
    Ivanov, Vladimir
    Kreuter, Ben
    Marcedone, Antonio
    McMahan, H. Brendan
    Patel, Sarvar
    Ramage, Daniel
    Segal, Aaron
    Seth, Karn
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1175 - 1191
  • [7] Threshold Cryptosystems from Threshold Fully Homomorphic Encryption
    Boneh, Dan
    Gennaro, Rosario
    Goldfeder, Steven
    Jain, Aayush
    Kim, Sam
    Rasmussen, Peter M. R.
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 565 - 596
  • [8] Brown TB, 2020, ADV NEUR IN, V33
  • [9] Caldas S., 2019, arXiv
  • [10] Chen C., 2021, P NEURIPS WORKSH