Diffusion models have attracted attention in recent years as innovative generative models. In this paper, we investigate whether a diffusion model is resistant to a membership inference attack, which evaluates the privacy leakage of a machine learning model. We primarily discuss the diffusion model from the standpoints of comparison with a generative adversarial network (GAN) as conventional models and hyperparameters unique to the diffusion model, i.e., time steps, sampling steps, and sampling variances. We conduct extensive experiments with DDIM as a diffusion model and DCGAN as a GAN on the CelebA and CIFAR-10 datasets in both white-box and black-box settings and then confirm if the diffusion model is comparably resistant to a membership inference attack as GAN. Next, we demonstrate that the impact of time steps is significant and intermediate steps in a noise schedule are the most vulnerable to the attack. We also found two key insights through further analysis. First, we identify that DDIM is vulnerable to the attack for small sample sizes instead of achieving a lower FID. Second, sampling steps in hyperparameters are important for resistance to the attack, whereas the impact of sampling variances is quite limited.
翻译:扩散模型的成员推断攻击
扩散模型作为创新的生成模型近年来备受关注。本文研究了扩散模型是否能够抵御成员推断攻击,该攻击评估机器学习模型的隐私泄漏。我们从与传统模型生成对抗网络(GAN)的比较以及扩散模型特有的超参数(时间步长、采样步长和采样方差)的角度进行了讨论。我们在CelebA和CIFAR-10数据集上使用DDIM作为扩散模型,使用DCGAN作为GAN,在白盒和黑盒设置下进行了大量实验,并确认扩散模型是否能够像GAN一样抵抗成员推断攻击。接下来,我们证明时间步骤的影响巨大,噪声计划中的中间步骤最容易受到攻击。通过进一步的分析,我们还找到了两个关键见解。首先,我们确定DDIM在样本数量较少的情况下很容易受到攻击,而不是实现较低的FID。其次,在超参数中,采样步骤对于抵抗攻击非常重要,而采样方差的影响非常有限。