Relying on the fact that not all inputs require the same amount of computation to yield a confident prediction, multi-exit networks are gaining attention as a prominent approach for pushing the limits of efficient deployment. Multi-exit networks endow a backbone model with early exits, allowing to obtain predictions at intermediate layers of the model and thus save computation time and/or energy. However, current various designs of multi-exit networks are only considered to achieve the best trade-off between resource usage efficiency and prediction accuracy, the privacy risks stemming from them have never been explored. This prompts the need for a comprehensive investigation of privacy risks in multi-exit networks. In this paper, we perform the first privacy analysis of multi-exit networks through the lens of membership leakages. In particular, we first leverage the existing attack methodologies to quantify the multi-exit networks' vulnerability to membership leakages. Our experimental results show that multi-exit networks are less vulnerable to membership leakages and the exit (number and depth) attached to the backbone model is highly correlated with the attack performance. Furthermore, we propose a hybrid attack that exploits the exit information to improve the performance of existing attacks. We evaluate membership leakage threat caused by our hybrid attack under three different adversarial setups, ultimately arriving at a model-free and data-free adversary. These results clearly demonstrate that our hybrid attacks are very broadly applicable, thereby the corresponding risks are much more severe than shown by existing membership inference attacks. We further present a defense mechanism called TimeGuard specifically for multi-exit networks and show that TimeGuard mitigates the newly proposed attacks perfectly.
翻译:以并非所有投入都需要同等数量的计算才能得出有信心的预测,多输出网络作为推动高效部署限制的突出方法,正日益受到关注。多输出网络以早期退出为主干模型,从而可以在模型中间层获得预测,从而节省计算时间和/或能源。然而,目前多输出网络的各种设计仅被视为在资源使用效率和预测准确性之间实现最佳取舍,它们产生的隐私风险从未被探索过。这促使人们需要全面调查多输出网络的隐私风险。在本文件中,我们通过成员流失的镜头对多输出网络进行第一次隐私分析。特别是,我们首先利用现有的攻击方法来量化多输出网络对成员流失的脆弱性。我们的实验结果表明,多输出网络更容易受到成员流失的影响,而对主干模式的退出(数量和深度)与攻击性能有着高度的关联。此外,我们提议进行混合攻击,利用退出信息来改进现有袭击的强度攻击性能,从而具体地减轻现有袭击性攻击性能。我们首先利用现有攻击性攻击性攻击性网络的隐私分析,从而展示了现有攻击性攻击性攻击性风险。我们根据不同的侵略性攻击性模型评估了多种威胁。我们目前提出的渗漏数据的结果。