Model Inversion Attack: Difference between revisions

From Cognitive Attack Taxonomy
Created page with "== '''Model Inversion Attack ''' == '''Short Description:''' Attacker uses model responses to recontruct training dataset. <br> '''CAT ID:''' CAT-2023-014 <br> '''Layer:''' 7 <br> '''Operational Scale:''' Operational <br> '''Level of Maturity:''' Proof of Concept <br> '''Category:''' Exploit <br> '''Subcategory:''' <br> '''Also Known As:''' <br> == '''Description:''' == '''Brief Description:''' <br> '''Closely Related Concepts:''' <br> '''Mechanism:'..."
 
Line 27: Line 27:
'''Multipliers:'''  <br>
'''Multipliers:'''  <br>


'''Detailed Description:''' Attacker is able to infer characteristics about the model training data with varying degrees of accuracy, revealing potentially sensitive information. <br>
'''Detailed Description:''' Model Inversion Attacks utilize a model’s outputs as a means to reconstruct original training data sets or samples, potentially revealing sensitive information. A Model Inversion Attack requires awareness of model structure and outputs which the attacker uses to associate inputs and outputs. Through an iterative process, the attacker cumulatively reconstructs original input data. These attacks have the potential to reveal to sensitive training data.
<br>


'''INTERACTIONS''' [VETs]:  <br>
'''INTERACTIONS''' [VETs]:  <br>

Revision as of 02:47, 7 October 2024

Model Inversion Attack

Short Description: Attacker uses model responses to recontruct training dataset.

CAT ID: CAT-2023-014

Layer: 7

Operational Scale: Operational

Level of Maturity: Proof of Concept

Category: Exploit

Subcategory:

Also Known As:

Description:

Brief Description:

Closely Related Concepts:

Mechanism:

Multipliers:

Detailed Description: Model Inversion Attacks utilize a model’s outputs as a means to reconstruct original training data sets or samples, potentially revealing sensitive information. A Model Inversion Attack requires awareness of model structure and outputs which the attacker uses to associate inputs and outputs. Through an iterative process, the attacker cumulatively reconstructs original input data. These attacks have the potential to reveal to sensitive training data.

INTERACTIONS [VETs]:

Examples:

Use Case Example(s):

Example(s) From The Wild:

Comments:

References: