Full metadata record
DC FieldValueLanguage
dc.contributorDepartment of Electrical and Electronic Engineeringen_US
dc.contributor.advisorHu, Haibo (EEE)en_US
dc.creatorWu, Ming-
dc.identifier.urihttps://theses.lib.polyu.edu.hk/handle/200/13916-
dc.languageEnglishen_US
dc.publisherHong Kong Polytechnic Universityen_US
dc.rightsAll rights reserveden_US
dc.titleImage restoration attack and defense based StyleGANen_US
dcterms.abstractModel Inversion Attack (MIA) is a privacy-invasion technique against some machine learning models where the data used in training the model can be reversed by reading the output of the model. By using MIA, the data leakage during the model training process can be a huge problem. The Image Restoration Attack (IRA) is a subclass of the MIA that focuses on image recovery. Among the high-resolution inversion attacks that currently exist, Model InveRsion for deep leaRning NetwORk (MIRROR) is the state-of-the-art. This paper proposes three different approaches based on MIRROR in order to optimize its effectiveness: 1. Guiding the mutation process of genetic algorithm using gradient estimation to optimize its searching efficiency. 2. Using Gaussian Mixture Models (GMM) to improve the quality of input samples during distribution clipping. 3. Using ensemble attack to optimize the output of the target model and multiple proxy models simultaneously to ensure its attack effect on different models. In addition to this, this paper proposes two possible defenses against MIA: 1. Limit the frequency of user queries to limit the rate at which an attacker can collect model information. 2. Analyze user query patterns and eliminate attacks by disabling abnormal access.en_US
dcterms.extent1 volume (unpaged) : color illustrationsen_US
dcterms.isPartOfPolyU Electronic Thesesen_US
dcterms.issued2025en_US
dcterms.educationalLevelM.Sc.en_US
dcterms.educationalLevelAll Masteren_US
dcterms.accessRightsrestricted accessen_US

Files in This Item:
File Description SizeFormat 
8324.pdfFor All Users (off-campus access for PolyU Staff & Students only)1.84 MBAdobe PDFView/Open


Copyright Undertaking

As a bona fide Library user, I declare that:

  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.

By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

Show simple item record

Please use this identifier to cite or link to this item: https://theses.lib.polyu.edu.hk/handle/200/13916