Privacy Re‐Identification Attacks on Tabular GANs

  • Alshantti A
  • Rasheed A
  • Westad F
N/ACitations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Generative models are effective in producing realistic tabular synthetic data that resembles the properties and distribution of real datasets. While synthetic data has numerous applications across various domains, generative models are susceptible to overfitting, which can lead to the leakage of sensitive information from training data. Privacy attacks exacerbate this issue by attempting to identify original data records from synthetic data, especially when the attacker possesses some knowledge about the generative model. In this work, we investigate the privacy risks associated with using generative adversarial networks (GANs) to create tabular synthetic datasets. More specifically, we develop privacy reconstruction attacks designed to identify training samples by minimizing their proximity to synthetic records. Our experimental analysis considers various scenarios of reconstruction attacks, in which attackers have different levels of access to the generative models. Additionally, we propose multi‐objective optimization using evolutionary algorithms to perturb synthetic samples closer to original training data points. The experimental results show that reconstruction attacks can effectively identify training samples, with privacy threats significantly increasing when attackers have access to the generative model. Furthermore, our findings indicate that using evolutionary algorithms in reconstruction attacks further heightens the risk of identifying confidential samples. Comparing our attacks against state‐of‐the‐art privacy attacks on tabular GANs further reveals that our reconstructions attacks are considerably more effective in recovering real data records.

Cite

CITATION STYLE

APA

Alshantti, A., Rasheed, A., & Westad, F. (2025). Privacy Re‐Identification Attacks on Tabular GANs. SECURITY AND PRIVACY, 8(1). https://doi.org/10.1002/spy2.469

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free