{"id":2455,"date":"2022-01-20T16:25:01","date_gmt":"2022-01-20T22:25:01","guid":{"rendered":"https:\/\/singularityumexicosummit.com\/?p=2455"},"modified":"2022-01-20T16:25:01","modified_gmt":"2022-01-20T22:25:01","slug":"not-so-mysterious-after-all-researchers-show-how-to-crack-ais-black-box","status":"publish","type":"post","link":"https:\/\/singularityumexico.com\/en\/not-so-mysterious-after-all-researchers-show-how-to-crack-ais-black-box\/","title":{"rendered":"Not So Mysterious After All: Researchers Show How to Crack AI\u2019s Black Box"},"content":{"rendered":"<p>The deep learning neural networks at the heart of modern artificial intelligence are often described as \u201c<a href=\"https:\/\/singularityhub.com\/2019\/04\/17\/in-defense-of-black-box-ai\/\">black boxes<\/a>\u201d whose inner workings are inscrutable. But new research calls that idea into question, with significant implications for privacy.<\/p>\n\n\n\n<p>Unlike traditional software whose functions are predetermined by a developer, neural networks learn how to process or analyze data by training on examples. They do this by continually adjusting the strength of the links between their many&nbsp;<a href=\"https:\/\/singularityhub.com\/2021\/09\/12\/new-study-finds-a-single-neuron-is-a-surprisingly-complex-little-computer\/\">neurons<\/a>.<\/p>\n\n\n\n<p>By the end of this process, the way they make decisions is tied up in a tangled network of connections that can be impossible to follow. As a result, it\u2019s often assumed that even if you have access to the model itself, it\u2019s more or less impossible to work out the data that the system was trained on.<\/p>\n\n\n\n<p>But a pair of recent papers have brought this assumption into question,&nbsp;<a href=\"https:\/\/www.technologyreview.com\/2021\/10\/12\/1036844\/ai-gan-fake-faces-data-privacy-security-leak\/\">according to&nbsp;<em>MIT Technology Review<\/em><\/a><em>,<\/em>&nbsp;by showing that two very different techniques can be used to identify the data a model was trained on. This&nbsp;could have serious implications for&nbsp;<a href=\"https:\/\/singularityhub.com\/tag\/artificial-intelligence\/\">AI<\/a>&nbsp;systems trained on sensitive information like health records or financial data.<\/p>\n\n\n\n<p>The first approach takes aim at generative adversarial networks (GANs), the AI systems behind&nbsp;<a href=\"https:\/\/singularityhub.com\/2021\/10\/20\/ai-savvy-criminals-pulled-off-a-35-million-deepfake-bank-heist\/\">deepfake<\/a>&nbsp;images. These systems&nbsp;are increasingly being used to create&nbsp;<a href=\"https:\/\/singularityhub.com\/2021\/03\/18\/this-ai-uses-your-brain-activity-to-create-fake-faces-it-knows-youll-find-attractive\/\">synthetic faces<\/a>&nbsp;that are supposedly completely unrelated to real&nbsp;people.<\/p>\n\n\n\n<p>But researchers from the University of Caen Normandy in France showed that they could easily link&nbsp;<a href=\"https:\/\/singularityhub.com\/2018\/12\/24\/nvidias-fake-faces-are-a-masterpiece-but-have-deeper-implications\/\">generated faces<\/a>&nbsp;from a popular model to real people whose data had been used to train the GAN. They did this by getting a second facial recognition model to compare the generated faces against training samples to spot if they shared the same identity.<\/p>\n\n\n\n<p>The images aren\u2019t an exact match, as the GAN has modified them, but the researchers&nbsp;found&nbsp;multiple&nbsp;examples where generated faces were clearly linked to images in the training data. In&nbsp;a&nbsp;<a href=\"https:\/\/arxiv.org\/pdf\/2107.06018.pdf\">paper describing the research<\/a>,&nbsp;they&nbsp;point out that in many cases the generated face is simply the original face in a different pose.<\/p>\n\n\n\n<p>While the approach is specific to face-generation GANs, the researchers point out that similar ideas could be applied to things like biometric data or medical images. Another, more general approach to reverse engineering neural nets could do that straight off the bat, though.<\/p>\n\n\n\n<p>A group from Nvidia has shown&nbsp;that&nbsp;they can infer the data the model was trained on without even seeing any examples of the trained data. They used an approach called model inversion, which effectively runs the neural net in reverse. This technique is often used to analyze neural networks, but using it to recover the input data had only been achieved on simple networks under very specific sets of assumptions.<\/p>\n\n\n\n<p>In&nbsp;<a href=\"https:\/\/arxiv.org\/pdf\/2107.06304.pdf\">a recent paper<\/a>,&nbsp;the researchers described&nbsp;how they were able to scale the approach to large networks by splitting the problem up and carrying out inversions on each of the networks\u2019 layers separately.&nbsp;With this&nbsp;approach, they were able to recreate training data images using nothing but the modelsthemselves.<\/p>\n\n\n\n<p>While carrying out either attack is a complex process that requires intimate access to the model in question, both highlight the fact that AIs&nbsp;may&nbsp;not&nbsp;be&nbsp;the black boxes we thought they were, and determined attackers&nbsp;could&nbsp;extract potentially&nbsp;sensitive&nbsp;information from them.<\/p>\n\n\n\n<p>Given that it\u2019s becoming increasingly easy&nbsp;to&nbsp;<a href=\"https:\/\/venturebeat.com\/2020\/06\/23\/researchers-propose-ai-that-reverse-engineers-black-box-apps\/\">reverse engineer someone else\u2019s model<\/a>&nbsp;using your own AI, the requirement to have access to the neural network isn\u2019t even that big of a barrier.<\/p>\n\n\n\n<p>The problem isn\u2019t restricted to image-based algorithms. Last year, researchers from&nbsp;<a href=\"https:\/\/venturebeat.com\/2020\/12\/16\/google-apple-and-others-show-large-language-models-trained-on-public-data-expose-personal-information\/\">a consortium of tech companies and universities<\/a>&nbsp;showed that they could extract news headlines, JavaScript code, and personally identifiable information from the large language model GPT-2.<\/p>\n\n\n\n<p>These issues are only going to become more pressing as AI systems push their way into sensitive areas like health, finance, and defense. There are&nbsp;<a href=\"https:\/\/venturebeat.com\/2019\/12\/21\/ai-has-a-privacy-problem-but-these-techniques-could-fix-it\/\">some solutions on the horizon<\/a>,&nbsp;such as differential privacy, where models are trained on the statistical features of aggregated data rather than individual data points, or homomorphic encryption, an emerging paradigm that makes it possible to compute directly on encrypted data.<\/p>\n\n\n\n<p>But these approaches are still a long way from being standard practice, so for the time being, entrusting your data to the black box of AI may not be as safe as you think.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-black-background-color has-black-color is-style-wide\"\/>\n\n\n\n<p><em>Image Credit:\u00a0<a href=\"https:\/\/www.shutterstock.com\/image-illustration\/modern-machine-design-cube-on-metal-1156132657\" target=\"_blank\" rel=\"noreferrer noopener\">Connect world<\/a>\u00a0\/\u00a0<a href=\"https:\/\/www.shutterstock.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Shutterstock.com<\/a><\/em><\/p>\n\n\n\n<p><strong>Author:<\/strong><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/singularityhub.com\/author\/egent\/\" target=\"_blank\"><br>EDD GENT<\/a> I am a freelance science and technology writer based in Bangalore, India. My main areas of interest are engineering, computing and biology, with a particular focus on the intersections between the three.<a href=\"https:\/\/singularityhub.com\/author\/egent\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Learn More<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/singularityhub.com\/2021\/10\/25\/not-so-mysterious-after-all-researchers-show-how-to-crack-ais-black-box\/\" target=\"_blank\" rel=\"noreferrer noopener\">Original Article<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>The deep learning neural networks at the heart of modern artificial intelligence are often described as \u201cblack boxes\u201d whose inner workings are inscrutable. But new research calls that idea into question, with significant implications for privacy. Unlike traditional software whose functions are predetermined by a developer, neural networks learn how to process or analyze data [&#8230;]\n","protected":false},"author":1,"featured_media":2456,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","footnotes":""},"categories":[13],"tags":[26,27],"series":[],"class_list":["post-2455","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos-ingles","tag-artificial-intelligence","tag-inteligencia-artificial-2"],"episode_featured_image":"https:\/\/singularityumexico.com\/wp-content\/uploads\/2022\/01\/modern-machine-design-cube-on-metal_shutterstock_1156132657-1068x601-1.jpg","episode_player_image":"https:\/\/singularityumexico.com\/wp-content\/uploads\/2023\/05\/11711533-1673157178559-89a95be153719-4-scaled.jpg","download_link":"","player_link":"","audio_player":false,"episode_data":{"playerMode":"dark","subscribeUrls":{"apple_podcasts":{"key":"apple_podcasts","url":"","label":"Apple Podcasts","class":"apple_podcasts","icon":"apple-podcasts.png"},"stitcher":{"key":"stitcher","url":"","label":"Stitcher","class":"stitcher","icon":"stitcher.png"},"google_podcasts":{"key":"google_podcasts","url":"","label":"Google Podcasts","class":"google_podcasts","icon":"google-podcasts.png"},"spotify":{"key":"spotify","url":"","label":"Spotify","class":"spotify","icon":"spotify.png"}},"rssFeedUrl":"https:\/\/singularityumexico.com\/en\/feed\/podcast\/the-feedback-loop-by-singularity","embedCode":"<blockquote class=\"wp-embedded-content\" data-secret=\"grP8VImPc6\"><a href=\"https:\/\/singularityumexico.com\/en\/not-so-mysterious-after-all-researchers-show-how-to-crack-ais-black-box\/\">Not So Mysterious After All: Researchers Show How to Crack AI\u2019s Black Box<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/singularityumexico.com\/en\/not-so-mysterious-after-all-researchers-show-how-to-crack-ais-black-box\/embed\/#?secret=grP8VImPc6\" width=\"500\" height=\"350\" title=\"&#8220;Not So Mysterious After All: Researchers Show How to Crack AI\u2019s Black Box&#8221; &#8212; Singularity Mexico\" data-secret=\"grP8VImPc6\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/singularityumexico.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n"},"_links":{"self":[{"href":"https:\/\/singularityumexico.com\/en\/wp-json\/wp\/v2\/posts\/2455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/singularityumexico.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/singularityumexico.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/singularityumexico.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/singularityumexico.com\/en\/wp-json\/wp\/v2\/comments?post=2455"}],"version-history":[{"count":0,"href":"https:\/\/singularityumexico.com\/en\/wp-json\/wp\/v2\/posts\/2455\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/singularityumexico.com\/en\/wp-json\/wp\/v2\/media\/2456"}],"wp:attachment":[{"href":"https:\/\/singularityumexico.com\/en\/wp-json\/wp\/v2\/media?parent=2455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/singularityumexico.com\/en\/wp-json\/wp\/v2\/categories?post=2455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/singularityumexico.com\/en\/wp-json\/wp\/v2\/tags?post=2455"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/singularityumexico.com\/en\/wp-json\/wp\/v2\/series?post=2455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}