Member-only story

KDD2024 | Research on Privacy Risks in Interest Point Recommendation

Beck Moulton
7 min readNov 6, 2024

--

Hey, remember to give it to me“ Machine Learning and Recommendation Algorithms ”Add Star symbol

TLDR:

paperhttps://arxiv.org/abs/2310.18606
code:https://github.com/KunlinChoi/POIPrivacy

0 Summary

2.1 LocExtract location extraction attack

The purpose of this attack is to extract the most frequently visited location by a user during the training of the victim model. We found that when randomly querying victim models, these models tend to ‘over learn’ the most frequently visited locations by users, making these locations more likely to appear in the model output. For example, randomly select 10 users and use 100 randomly selected locations to query the victim model. Among these queries, 32.5% of the query results will display the most frequently visited locations of the target user, while these most frequently visited locations only account for 18.7% of the user dataset.

Based on this observation, we have designed the following attack method: by generating different random inputs and iteratively querying the victim model multiple times, we use Soft Voting to select the position with the highest aggregated logit from all query results as the…

--

--

Beck Moulton
Beck Moulton

Written by Beck Moulton

Focus on the back-end field, do actual combat technology sharing Buy me a Coffee if You Appreciate My Hard Work https://www.buymeacoffee.com/BeckMoulton

No responses yet