Datasets:
Formats:
json
Languages:
English
Size:
< 1K
Tags:
reinforcement-learning
browser-fingerprinting
adversarial-machine-learning
differential-privacy
transfer-attacks
License:
File size: 2,718 Bytes
372639a | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 | ---
license: cc-by-sa-4.0
language:
- en
size_categories:
- 10K<n<100K
tags:
- reinforcement-learning
- browser-fingerprinting
- adversarial-machine-learning
- differential-privacy
- transfer-attacks
pretty_name: CANO Adversarial Privacy Evaluations
---
# CANO Adversarial Privacy Evaluations
68,885 experimental evaluations of six noise-injection privacy strategies
(CANO, Gaussian, FGSM, PGD, Laplace, Carlini-Wagner) against three adaptive
attacker models (Random Forest, Gradient Boosting, MLP) across 12 datasets,
including the real **FP-Stalker** browser-fingerprint corpus
(776 users, 13,674 fingerprints, 34 attributes; Vastel et al., IEEE S&P 2018).
Aggregate statistics in the paper are computed over 54,281 in-scope
configurations after excluding the 2-user `cybersec_intrusion` dataset
(binary task, not a k-class fingerprinting benchmark).
## Files
| File | Description |
|---|---|
| `cano_evaluations.csv` | Per-config raw results: strategy, epsilon, attacker, rep, dataset, accuracy_reduction, transfer_reduction, noise L2/SNR/sparsity, KL divergence, sensitivity, etc. |
| `cano_paper_v2.{txt,pdf}` | Paper draft with refreshed tables and the FP-Stalker findings. |
| `evaluation_results.json` | Aggregate strategy comparison, per-dataset best, significance tests, RL training summary. |
| `feature_importance.json` | Permutation importance from the Phase 2 Random Forest (used as CANO's allocation prior). |
| `rl_optimization.json` | DQN policy training trajectory (30 rounds, 50 users, Gini convergence). |
## Key findings
1. **Transfer-attack profile**: CANO achieves a 2.35× transfer-to-adaptive
ratio versus 1.04× for Gaussian — feature-importance allocation produces
more model-agnostic perturbations, which is the realistic deployment
setting (the defender can't tailor noise to the attacker's exact model).
2. **Real-world generalization**: On the FP-Stalker corpus, the CANO/Gaussian
gap narrows substantially (0.276 vs 0.340 mean accuracy reduction)
compared to small-synthetic datasets (e.g., synth_50u_20s: 0.003 vs 0.514).
Importance-weighted allocation generalizes better when feature importance
reflects real attribute redundancy rather than synthetic noise.
3. **Game-theoretic equilibrium**: RL-trained noise allocation converges
to near-uniform (Gini = 0.009) — uniform noise is the equilibrium against
adaptive adversaries, challenging static feature-weighted defense
assumptions.
## Citation
See `cano_paper_v2.txt` / `cano_paper_v2.pdf` for the methodology, full
results tables, and references. The companion code lives at
[github.com/tedrubin80/Adversarial-Privacy](https://github.com/tedrubin80/Adversarial-Privacy).
|