datamatters24 commited on
Commit
372639a
·
verified ·
1 Parent(s): 104f736

Initial upload: 68,885 configs + paper v2 with FP-Stalker block

Browse files
.gitattributes CHANGED
@@ -58,3 +58,5 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
58
  # Video files - compressed
59
  *.mp4 filter=lfs diff=lfs merge=lfs -text
60
  *.webm filter=lfs diff=lfs merge=lfs -text
 
 
 
58
  # Video files - compressed
59
  *.mp4 filter=lfs diff=lfs merge=lfs -text
60
  *.webm filter=lfs diff=lfs merge=lfs -text
61
+ cano_evaluations.csv filter=lfs diff=lfs merge=lfs -text
62
+ cano_paper_v2.pdf filter=lfs diff=lfs merge=lfs -text
README.md ADDED
@@ -0,0 +1,60 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: cc-by-sa-4.0
3
+ language:
4
+ - en
5
+ size_categories:
6
+ - 10K<n<100K
7
+ tags:
8
+ - reinforcement-learning
9
+ - browser-fingerprinting
10
+ - adversarial-machine-learning
11
+ - differential-privacy
12
+ - transfer-attacks
13
+ pretty_name: CANO Adversarial Privacy Evaluations
14
+ ---
15
+
16
+ # CANO Adversarial Privacy Evaluations
17
+
18
+ 68,885 experimental evaluations of six noise-injection privacy strategies
19
+ (CANO, Gaussian, FGSM, PGD, Laplace, Carlini-Wagner) against three adaptive
20
+ attacker models (Random Forest, Gradient Boosting, MLP) across 12 datasets,
21
+ including the real **FP-Stalker** browser-fingerprint corpus
22
+ (776 users, 13,674 fingerprints, 34 attributes; Vastel et al., IEEE S&P 2018).
23
+
24
+ Aggregate statistics in the paper are computed over 54,281 in-scope
25
+ configurations after excluding the 2-user `cybersec_intrusion` dataset
26
+ (binary task, not a k-class fingerprinting benchmark).
27
+
28
+ ## Files
29
+
30
+ | File | Description |
31
+ |---|---|
32
+ | `cano_evaluations.csv` | Per-config raw results: strategy, epsilon, attacker, rep, dataset, accuracy_reduction, transfer_reduction, noise L2/SNR/sparsity, KL divergence, sensitivity, etc. |
33
+ | `cano_paper_v2.{txt,pdf}` | Paper draft with refreshed tables and the FP-Stalker findings. |
34
+ | `evaluation_results.json` | Aggregate strategy comparison, per-dataset best, significance tests, RL training summary. |
35
+ | `feature_importance.json` | Permutation importance from the Phase 2 Random Forest (used as CANO's allocation prior). |
36
+ | `rl_optimization.json` | DQN policy training trajectory (30 rounds, 50 users, Gini convergence). |
37
+
38
+ ## Key findings
39
+
40
+ 1. **Transfer-attack profile**: CANO achieves a 2.35× transfer-to-adaptive
41
+ ratio versus 1.04× for Gaussian — feature-importance allocation produces
42
+ more model-agnostic perturbations, which is the realistic deployment
43
+ setting (the defender can't tailor noise to the attacker's exact model).
44
+
45
+ 2. **Real-world generalization**: On the FP-Stalker corpus, the CANO/Gaussian
46
+ gap narrows substantially (0.276 vs 0.340 mean accuracy reduction)
47
+ compared to small-synthetic datasets (e.g., synth_50u_20s: 0.003 vs 0.514).
48
+ Importance-weighted allocation generalizes better when feature importance
49
+ reflects real attribute redundancy rather than synthetic noise.
50
+
51
+ 3. **Game-theoretic equilibrium**: RL-trained noise allocation converges
52
+ to near-uniform (Gini = 0.009) — uniform noise is the equilibrium against
53
+ adaptive adversaries, challenging static feature-weighted defense
54
+ assumptions.
55
+
56
+ ## Citation
57
+
58
+ See `cano_paper_v2.txt` / `cano_paper_v2.pdf` for the methodology, full
59
+ results tables, and references. The companion code lives at
60
+ [github.com/tedrubin80/Adversarial-Privacy](https://github.com/tedrubin80/Adversarial-Privacy).
cano_evaluations.csv ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4b5c6f5362d175c35a8751dbea9db99482a4a5dcb9fc027e4351f30b7a85bfc3
3
+ size 19380452
cano_paper_v2.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:506417a896ef5c23bab37ac47a59162a6b38cfa18417b75590ce039822288b2e
3
+ size 2331058
cano_paper_v2.txt ADDED
@@ -0,0 +1,410 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ================================================================================
2
+ CANO: Context-Aware Noise Optimization for Adversarial Privacy Protection
3
+ ================================================================================
4
+
5
+ AUTHORS: [INSERT]
6
+ AFFILIATION: [INSERT]
7
+ EMAIL: [INSERT]
8
+
9
+ ================================================================================
10
+ ABSTRACT
11
+ ================================================================================
12
+
13
+ We present CANO (Context-Aware Noise Optimization), an adaptive noise injection
14
+ system that optimizes the privacy-utility tradeoff in adversarial privacy
15
+ protection. Unlike uniform noise strategies, CANO allocates noise proportionally
16
+ to each feature's contribution to re-identification, concentrating protection
17
+ where it matters most while preserving utility on low-impact features.
18
+
19
+ We evaluate CANO against five baseline strategies (Gaussian, FGSM, PGD,
20
+ Carlini-Wagner, and Laplace) across 68,885 experimental configurations
21
+ spanning 12 datasets (11 after excluding the 2-user cybersec_intrusion dataset
22
+ from aggregate statistics), 3 attack models, and 6 noise budgets. Aggregate
23
+ statistics are computed over 54,281 in-scope configurations, including a
24
+ complete 540-row block on the real FP-Stalker browser-fingerprint corpus
25
+ (Vastel et al. [10]; 776 users, 13,674 fingerprints, 34 attributes).
26
+
27
+ Against a known adaptive attacker, CANO achieves a mean accuracy reduction of
28
+ 0.112 +/- 0.178 (see Fig. 1, Fig. 3) -- below
29
+ Gaussian noise (0.395) but above C&W (0.001).
30
+ However, CANO achieves a strong transfer-attack profile: a transfer-to-adaptive
31
+ ratio of 2.35x (transfer reduction 0.263 vs adaptive
32
+ 0.112), compared to 1.04x for Gaussian. CANO's
33
+ feature-importance allocation produces perturbations that generalize better
34
+ across unseen attack models (see Fig. 2 Pareto front) -- the realistic
35
+ deployment setting. CANO also produces lower noise magnitude than
36
+ Gaussian/FGSM while retaining higher SNR (see Fig. 4).
37
+
38
+ In adversarial co-evolutionary training, the DQN policy reduces attacker
39
+ re-identification accuracy from 74.8% to 20.8% within 30 rounds (Fig. 6),
40
+ converging to near-uniform allocation (Gini coefficient: 0.009) -- empirically
41
+ demonstrating that uniform noise is the game-theoretic equilibrium against
42
+ adaptive adversaries.
43
+
44
+ Keywords: privacy protection, adversarial noise, reinforcement learning,
45
+ browser fingerprinting, context-aware optimization, transfer attacks
46
+
47
+
48
+ ================================================================================
49
+ 1. INTRODUCTION
50
+ ================================================================================
51
+
52
+ Browser fingerprinting poses a significant threat to user privacy. Attackers
53
+ construct unique device fingerprints from browser attributes -- canvas
54
+ rendering, WebGL, screen resolution, installed fonts -- to track users across
55
+ sessions without cookies [1].
56
+
57
+ Privacy-preserving systems combat fingerprinting by injecting noise. A
58
+ fundamental unresolved tension: whether uniform noise injection or
59
+ feature-weighted injection provides superior protection. A further practical
60
+ challenge: privacy systems are typically deployed without knowledge of the
61
+ adversary's exact attack model.
62
+
63
+ CANO addresses this through:
64
+ (1) Feature importance analysis.
65
+ (2) Proportional noise allocation with a minimum weight floor preventing
66
+ exploitable zero-noise features.
67
+ (3) RL that adapts allocation through adversarial co-evolution.
68
+ (4) Empirical analysis of the adaptive-vs-transfer tradeoff.
69
+
70
+ Our central finding is counterintuitive: while CANO does not maximize accuracy
71
+ reduction against a known adaptive attacker (Gaussian dominates), CANO achieves
72
+ a 2.35x transfer-to-adaptive ratio -- notably higher than Gaussian's
73
+ 1.04x. In real deployments, defenders cannot tailor their noise to
74
+ the adversary's model.
75
+
76
+ [PLACEHOLDER: Related Work -- required before submission. Cover browser
77
+ fingerprinting defenses (Laperdrix 2020 [1], Eckersley 2010 [7],
78
+ Vastel 2018 [10], Andriamilanto & Allard 2021 [8],
79
+ Andriamilanto et al. 2020 [9]), adversarial examples (Goodfellow 2015 [2],
80
+ Madry 2018 [3], Carlini 2017 [4]), DP (Dwork 2014 [5], Abadi 2016),
81
+ game-theoretic adversarial ML (Dalvi 2004, Brueckner & Scheffer 2011),
82
+ transferability (Papernot et al. 2016). Minimum 15 additional references.]
83
+
84
+
85
+ ================================================================================
86
+ 2. METHODOLOGY
87
+ ================================================================================
88
+
89
+ 2.1 Feature Importance Analysis
90
+
91
+ Random Forest (100 trees) on simulated fingerprint samples; permutation
92
+ importance (10 repeats). 9-dimensional feature space of normalized browser
93
+ fingerprint attributes. Baseline re-identification accuracy: 100% on synthetic
94
+ corpus.
95
+
96
+ Feature importance is highly concentrated: feature_0 (0.303) and feature_1
97
+ (0.302) account for ~99% of total importance; features 2-5 have exactly 0.000
98
+ permutation importance (Fig. 5). This motivates the minimum weight floor
99
+ (min_weight = 0.1) in Section 2.2.
100
+
101
+ [NOTE: Synthetic proxies, not real browser API measurements. Real-world
102
+ validation is in progress against the FP-Stalker corpus (Vastel et al.,
103
+ IEEE S&P 2018 [10]; ~21,809 real browser fingerprints across 40
104
+ attributes) with per-attribute instability and memory costs from BrFAST
105
+ (Andriamilanto & Allard, WWW '21 Companion [8]) supplying usability
106
+ weights directly to CANO's per-feature allocation.]
107
+
108
+ 2.2 CANO Noise Allocation
109
+
110
+ Given feature importance weights w_i and noise budget epsilon:
111
+
112
+ delta_i = epsilon * (w_i * n_features) * sign(z_i)
113
+
114
+ where z_i ~ N(0,1) or gradient direction when available. The n_features scaling
115
+ factor ensures equal total noise energy to baselines. The minimum weight floor
116
+ (min_weight = 0.1) prevents attackers from exploiting negligibly-noised
117
+ features.
118
+
119
+ 2.3 DQN Policy Training
120
+
121
+ Adversarial co-evolution (Fig. 6): 50 simulated users, 20 samples/user,
122
+ 9 features.
123
+
124
+ State: [feature_values, attack_confidence, privacy_budget, query_count]
125
+ Action: per-feature noise allocation weights (softmax-normalized)
126
+ Reward: alpha * privacy_gain - (1-alpha) * utility_cost
127
+
128
+ Training alternates defender (CANO) and attacker (GradientBoosting retraining).
129
+
130
+ 2.4 Experimental Setup
131
+
132
+ Strategies: Gaussian, FGSM, PGD, Carlini-Wagner, Laplace, CANO
133
+ Noise budgets: epsilon in {0.05, 0.10, 0.15, 0.20, 0.30, 0.50}
134
+ Attack models: Random Forest, Gradient Boosting, MLP
135
+ Datasets: 12 total -- 3 controlled synthetic (synth_small/medium/large),
136
+ 6 overlap/size-stress variants, 1 public keystroke
137
+ (CMU 51-users), 1 real browser-fingerprint corpus (FP-Stalker,
138
+ 776 users), and cybersec_intrusion (2-user, OUT-OF-SCOPE)
139
+ Total configs: 68,885 (aggregate statistics over
140
+ 54,281 in-scope configs; utility
141
+ metrics from the 3,529-row subset
142
+ for which sparsity/KL/deviation/sensitivity were recorded).
143
+
144
+ Scope note: cybersec_intrusion has 2 users (binary) -- not a valid k-class
145
+ fingerprinting benchmark. It is retained in the per-dataset breakdown
146
+ (Section 3.5) for completeness but excluded from all aggregate statistics,
147
+ comparison tables, and significance tests.
148
+
149
+
150
+ ================================================================================
151
+ 3. RESULTS
152
+ ================================================================================
153
+
154
+ 3.1 Overall Strategy Comparison (Adaptive Attack) [See Figure 1, Figure 3]
155
+
156
+ Table 1: Strategy comparison -- aggregate over in-scope datasets only.
157
+
158
+ Strategy AccReduction XferRed NoiseL2 SNR(dB) n
159
+ ------------------------------------------------------------------------
160
+ Gaussian 0.395 +/- 0.281 +0.411 0.595 9.7 10,423
161
+ Laplace 0.239 +/- 0.222 +0.391 0.556 11.2 8,460
162
+ FGSM 0.212 +/- 0.212 +0.472 0.642 9.8 9,641
163
+ PGD 0.129 +/- 0.171 +0.134 0.271 17.5 8,789
164
+ CANO (ours) 0.112 +/- 0.178 +0.263 0.435 15.5 8,508
165
+ C&W 0.001 +/- 0.011 -0.018 0.003 53.7 8,460
166
+
167
+ Gaussian is the strongest adaptive-attack strategy. CANO outperforms only C&W
168
+ on that metric. See Table 6 for significance.
169
+
170
+ 3.2 Transfer Attack Analysis [See Figure 2]
171
+
172
+ Table 2: Adaptive vs. transfer attack accuracy reduction (aggregate, in-scope).
173
+
174
+ Strategy Adaptive Transfer Ratio Gap
175
+ ------------------------------------------------------
176
+ CANO (ours) 0.112 +0.263 2.35x +0.151
177
+ FGSM 0.212 +0.472 2.23x +0.260
178
+ Laplace 0.239 +0.391 1.64x +0.152
179
+ PGD 0.129 +0.134 1.04x +0.005
180
+ Gaussian 0.395 +0.411 1.04x +0.016
181
+ C&W 0.001 -0.018 n/a -0.019
182
+
183
+ (Transfer numbers are from the 2026-04-05 utility-metric subset; the new
184
+ fpstalker block does not yet have transfer values computed -- backfill
185
+ planned. Adaptive numbers are aggregate over all 54,281 in-scope rows.)
186
+
187
+ CANO's 2.35x transfer-to-adaptive ratio reflects more
188
+ model-agnostic perturbations. Gaussian provides little additional transfer
189
+ protection. C&W is counterproductive (negative transfer reduction).
190
+
191
+ 3.3 Noise Utility Metrics [See Figure 4]
192
+
193
+ Table 3: Per-strategy noise-quality metrics (n=3,529
194
+ in-scope rows for which metrics were recorded; all CANO rows now report valid
195
+ values after the evaluation-script fix).
196
+
197
+ FGSM sparsity=1.000 KL=0.946 deviation=0.1824 sensitivity=-0.200 (n=649)
198
+ CANO (ours) sparsity=1.000 KL=0.581 deviation=0.1690 sensitivity=-0.190 (n=540)
199
+ Gaussian sparsity=1.000 KL=0.511 deviation=0.1423 sensitivity=+0.110 (n=720)
200
+ Laplace sparsity=1.000 KL=0.440 deviation=0.1750 sensitivity=-0.185 (n=540)
201
+ PGD sparsity=0.825 KL=0.156 deviation=0.0730 sensitivity=-0.071 (n=540)
202
+ C&W sparsity=1.000 KL=0.008 deviation=0.0009 sensitivity=-0.027 (n=540)
203
+
204
+ CANO's noise structure is distinguishable from Gaussian: similar KL divergence
205
+ but different sensitivity signature (negative for CANO, positive for Gaussian),
206
+ reflecting CANO's intentional concentration on importance-ranked (not
207
+ variance-ranked) features.
208
+
209
+ 3.4 Epsilon Sensitivity [See Figure 1]
210
+
211
+ Table 4: Accuracy reduction by noise budget (aggregate, in-scope).
212
+
213
+ Epsilon CANO FGSM Gaussian Laplace PGD C&W
214
+ ----------------------------------------------------------
215
+ 0.05 0.010 0.054 0.104 0.013 0.018 0.001
216
+ 0.10 0.035 0.103 0.195 0.060 0.037 0.001
217
+ 0.15 0.084 0.183 0.312 0.152 0.048 0.001
218
+ 0.20 0.131 0.258 0.431 0.253 0.072 0.001
219
+ 0.30 0.188 0.317 0.609 0.382 0.178 0.001
220
+ 0.50 0.226 0.374 0.750 0.576 0.433 0.002
221
+
222
+ CANO's ratio to Gaussian goes from 0.09 at epsilon=0.05 to
223
+ 0.30 at epsilon=0.50.
224
+
225
+ 3.5 Per-Dataset Analysis [See Figure 5]
226
+
227
+ Table 5: Mean accuracy reduction by dataset.
228
+
229
+ cybersec_intrusion users= 2 CANO= 0.034 Gauss= 0.192 FGSM= 0.094 Lap= 0.122 PGD= 0.088 [OUT-OF-SCOPE: 2-user binary task; excluded from aggregates]
230
+ fpstalker (real) users=776 CANO= 0.276 Gauss= 0.340 FGSM= 0.282 Lap= 0.291 PGD= 0.176
231
+ keystroke_cmu_51users users= 51 CANO= n/a Gauss= 0.657 FGSM= 0.357 Lap= n/a PGD= 0.413
232
+ overlap_10u_50s users= 10 CANO= 0.046 Gauss= 0.307 FGSM= 0.247 Lap= n/a PGD= n/a
233
+ overlap_20u_30s users= 20 CANO= 0.041 Gauss= 0.218 FGSM= 0.187 Lap= n/a PGD= n/a
234
+ synth_10u_50s users= 10 CANO= 0.001 Gauss= 0.270 FGSM= 0.057 Lap= n/a PGD= n/a
235
+ synth_20u_50s users= 20 CANO= 0.001 Gauss= 0.378 FGSM= 0.135 Lap= n/a PGD= n/a
236
+ synth_50u_20s users= 50 CANO= 0.003 Gauss= 0.514 FGSM= 0.356 Lap= n/a PGD= n/a
237
+ synth_5u_30s users= 5 CANO=-0.006 Gauss= 0.208 FGSM= 0.072 Lap= n/a PGD= n/a
238
+ synth_large users= 20 CANO= 0.135 Gauss= 0.416 FGSM= 0.234 Lap= 0.304 PGD= 0.152
239
+ synth_medium users= 10 CANO= 0.082 Gauss= 0.306 FGSM= 0.153 Lap= 0.198 PGD= 0.090
240
+ synth_small users= 5 CANO= 0.116 Gauss= 0.287 FGSM= 0.190 Lap= 0.215 PGD= 0.109
241
+
242
+ cybersec_intrusion is shown for completeness only. fpstalker is the real
243
+ browser-fingerprint corpus (Vastel et al. [10]) and is the closest dataset
244
+ to deployment conditions; on it, CANO closes most of the gap to Gaussian
245
+ (0.276 vs 0.340), in contrast to the wider gaps on small-synthetic datasets.
246
+
247
+ 3.6 Statistical Significance (aggregate, in-scope)
248
+
249
+ Table 6: CANO vs each baseline, Welch t-test and Cohen's d.
250
+
251
+ CANO vs C&W d= +0.880 p < 0.001 ***
252
+ CANO vs FGSM d= -0.510 p < 0.001 ***
253
+ CANO vs Gaussian d= -1.202 p < 0.001 ***
254
+ CANO vs Laplace d= -0.631 p < 0.001 ***
255
+ CANO vs PGD d= -0.093 p < 0.001 ***
256
+
257
+ 3.7 Adversarial Training Results (DQN Policy) [See Figure 6]
258
+
259
+ DQN policy trained over 30 adversarial rounds with 50 users:
260
+
261
+ Baseline attack accuracy: 74.8%
262
+ Final attack accuracy: 20.8%
263
+ Accuracy reduction: 54.0 percentage points
264
+ Noise magnitude: 0.6061
265
+ DQN training steps: 31,500
266
+ Final Gini coefficient: 0.009 (near-uniform)
267
+
268
+ Uniform allocation emerges as the game-theoretic equilibrium against adaptive
269
+ adversaries.
270
+
271
+
272
+ ================================================================================
273
+ 4. DISCUSSION
274
+ ================================================================================
275
+
276
+ 4.1 Key Findings
277
+
278
+ (1) Noise scaling (n_features multiplier) is the most impactful design choice.
279
+ (2) Gaussian is the strongest adaptive-attacker defense (d = -1.20
280
+ vs CANO).
281
+ (3) CANO achieves a 2.35x transfer/adaptive ratio.
282
+ (4) RL equilibrium is uniform allocation (Gini = 0.009).
283
+ (5) CANO uses less noise than Gaussian (L2 = 0.435 vs
284
+ 0.595) with higher SNR (15.5
285
+ vs 9.7 dB).
286
+ (6) On the real FP-Stalker corpus (776 users, 34 attributes), CANO closes most
287
+ of the gap to Gaussian (0.276 vs 0.340) -- a notably tighter result than
288
+ the typical small-synthetic gap (e.g., synth_50u_20s: CANO 0.003 vs
289
+ Gaussian 0.514). This suggests the importance-weighted allocation
290
+ generalizes better when feature importance reflects real attribute
291
+ redundancy rather than synthetic noise.
292
+
293
+ 4.2 Limitations
294
+
295
+ - One real browser-fingerprint dataset (FP-Stalker, 776 users) plus
296
+ synthetic/semi-synthetic plus CMU keystroke. Larger real-world fingerprint
297
+ corpora (HTillmann; BrFAST extended) are the next integration.
298
+ - 9 synthetic features with artificial importance concentration.
299
+ - cybersec_intrusion (2 users) excluded from aggregates.
300
+ - Utility metrics reported on 3,529-row subset
301
+ (most-recent run only). Backfill re-run planned for older configs.
302
+ - RL at 50 users; scaling TBD.
303
+
304
+ 4.3 Future Work
305
+
306
+ (1) Backfill transfer-attack and noise-utility metrics (sparsity, KL,
307
+ deviation, sensitivity) for the new fpstalker block; the older
308
+ synthetic-only utility-metric subset (n=3,529) does not yet include
309
+ fpstalker rows, so Tables 2 and 3 are still computed on that subset
310
+ while Tables 1, 4, 5, 6 use the full 54,281-row aggregate.
311
+ (2) Extend utility-metric coverage across all historical evaluation runs.
312
+ (3) Formal DP guarantees for CANO's allocation mechanism.
313
+ (4) Larger RL training (1,000+ users); online policy updates in deployment.
314
+ (5) Theoretical analysis of conditions under which feature-weighted noise
315
+ achieves higher transfer efficiency than uniform noise.
316
+
317
+
318
+ ================================================================================
319
+ 5. CONCLUSION
320
+ ================================================================================
321
+
322
+ CANO does not match Gaussian in raw adaptive-attack accuracy reduction
323
+ (0.112 vs 0.395), but achieves a 2.35x
324
+ transfer-to-adaptive ratio -- better model-agnostic behavior than Gaussian
325
+ (1.04x) in the transfer setting, which better reflects real-world
326
+ deployment. On the real FP-Stalker browser-fingerprint corpus the
327
+ adaptive-attack gap also narrows substantially (CANO 0.276 vs Gaussian 0.340),
328
+ reinforcing the case that importance-weighted allocation generalizes better
329
+ under realistic conditions than the small-synthetic aggregate suggests.
330
+
331
+ Contributions:
332
+ (1) Noise scaling correction: equal total noise energy while redistributing
333
+ by importance.
334
+ (2) Transfer efficiency result: feature-importance weighting produces more
335
+ model-agnostic perturbations.
336
+ (3) RL equilibrium finding: uniform noise is the game-theoretic equilibrium
337
+ against adaptive adversaries (Gini = 0.009 after 30 rounds).
338
+ (4) Real-world validation: the 540-row complete block on FP-Stalker
339
+ (776 users, 13,674 fingerprints) shows the synthetic CANO/Gaussian gap
340
+ narrows substantially under realistic feature distributions.
341
+
342
+
343
+ ================================================================================
344
+ FIGURES
345
+ ================================================================================
346
+
347
+ Figure 1: Accuracy reduction vs. noise budget epsilon, per strategy.
348
+ File: results/figures/fig1_accuracy_reduction_vs_epsilon.png
349
+ Figure 2: Privacy-utility Pareto front.
350
+ File: results/figures/fig2_pareto_front.png
351
+ Figure 3: Per-strategy heatmap of accuracy reduction across datasets.
352
+ File: results/figures/fig3_strategy_heatmap.png
353
+ Figure 4: Statistical significance of CANO vs each baseline.
354
+ File: results/figures/fig4_statistical_significance.png
355
+ Figure 5: Per-dataset accuracy reduction bars.
356
+ File: results/figures/fig5_per_dataset.png
357
+ Figure 6: DQN adversarial training progress (attacker accuracy vs round).
358
+ File: results/figures/rl_training_progress.png
359
+
360
+
361
+ ================================================================================
362
+ REFERENCES
363
+ ================================================================================
364
+
365
+ [1] Laperdrix, P. et al. "Browser Fingerprinting: A Survey." ACM CSUR, 2020.
366
+ [2] Goodfellow, I. et al. "Explaining and Harnessing Adversarial Examples."
367
+ ICLR, 2015.
368
+ [3] Madry, A. et al. "Towards Deep Learning Models Resistant to Adversarial
369
+ Attacks." ICLR, 2018.
370
+ [4] Carlini, N. & Wagner, D. "Towards Evaluating the Robustness of Neural
371
+ Networks." IEEE S&P, 2017.
372
+ [5] Dwork, C. et al. "The Algorithmic Foundations of Differential Privacy."
373
+ Foundations and Trends in TCS, 2014.
374
+ [6] Mnih, V. et al. "Human-level Control through Deep Reinforcement Learning."
375
+ Nature, 2015.
376
+ [7] Eckersley, P. "How Unique Is Your Web Browser?" PETS, 2010.
377
+ [8] Andriamilanto, N. and Allard, T. "BrFAST: a Tool to Select Browser
378
+ Fingerprinting Attributes for Web Authentication According to a
379
+ Usability-Security Trade-off." Companion Proceedings of the Web
380
+ Conference 2021 (WWW '21 Companion), pp. 1-4, ACM, Ljubljana, Slovenia,
381
+ April 2021. DOI: 10.1145/3442442.3458610.
382
+ Source + data assets: github.com/tandriamil/BrFAST (MIT License).
383
+ [9] Andriamilanto, N., Allard, T., and Le Guelvouit, G. "FPSelect:
384
+ Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks
385
+ against Web Authentication Mechanisms." ACM CCS 2020.
386
+ DOI: 10.1145/3427228.3427297. arXiv:2010.06404.
387
+ [10] Vastel, A., Laperdrix, P., Rudametkin, W., and Rouvoy, R.
388
+ "FP-STALKER: Tracking Browser Fingerprint Evolutions."
389
+ IEEE Symposium on Security and Privacy (S&P), pp. 728-741, 2018.
390
+ DOI: 10.1109/SP.2018.00008.
391
+ Raw dataset (~21,809 fingerprints, 40 attributes):
392
+ github.com/Spirals-Team/FPStalker.
393
+ [11] Tillmann, H. "Browser Fingerprinting: 93% der Nutzer hinterlassen
394
+ eindeutige Spuren." Technical report, henning-tillmann.de, October
395
+ 2013. Dataset redistributed as part of the BrFAST assets [8].
396
+
397
+ [PLACEHOLDER: 15+ additional references needed -- related work section
398
+ should cover Laperdrix 2020, Vastel 2018, Nikiforakis 2013, Abadi 2016
399
+ (DP-SGD), Papernot 2016 (transferability), Dalvi 2004 /
400
+ Brueckner & Scheffer 2011 (game-theoretic ML).]
401
+
402
+
403
+ ================================================================================
404
+ Generated: 2026-04-26 02:30:00
405
+ Data source: 19 merged eval_*.jsonl files (68,885 raw configs from
406
+ overnight runs 2026-03-22 through 2026-04-25, including the
407
+ complete 540-row fpstalker block from the systemd-service
408
+ resume run 2026-04-19); excluding cybersec_intrusion from
409
+ aggregates (54,281 in-scope configs).
410
+ ================================================================================
evaluation_results.json ADDED
@@ -0,0 +1,198 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "timestamp": "2026-04-26T02:29:34.665300",
3
+ "source_files": [
4
+ "eval_20260322_213337.jsonl",
5
+ "eval_20260322_223214.jsonl",
6
+ "eval_20260323_020050.jsonl",
7
+ "eval_20260324_020051.jsonl",
8
+ "eval_20260325_020051.jsonl",
9
+ "eval_20260326_020052.jsonl",
10
+ "eval_20260327_020053.jsonl",
11
+ "eval_20260328_020057.jsonl",
12
+ "eval_20260329_002315.jsonl",
13
+ "eval_20260329_020050.jsonl",
14
+ "eval_20260330_020108.jsonl",
15
+ "eval_20260331_020112.jsonl",
16
+ "eval_20260401_020109.jsonl",
17
+ "eval_20260402_020120.jsonl",
18
+ "eval_20260403_020125.jsonl",
19
+ "eval_20260405_164650.jsonl",
20
+ "eval_20260412_172926.jsonl",
21
+ "eval_20260417_144304.jsonl",
22
+ "eval_20260419_193000.jsonl"
23
+ ],
24
+ "total_evaluations": 54281,
25
+ "strategy_comparison": {
26
+ "gaussian": {
27
+ "acc_red_mean": 0.3952317531837953,
28
+ "acc_red_std": 0.28103528762790336,
29
+ "noise_l2": 0.5948564979466564,
30
+ "snr_db": 9.734524590047702,
31
+ "n": 10423
32
+ },
33
+ "fgsm": {
34
+ "acc_red_mean": 0.2122695026393766,
35
+ "acc_red_std": 0.2121446394156302,
36
+ "noise_l2": 0.6418459298152309,
37
+ "snr_db": 9.765196918075839,
38
+ "n": 9641
39
+ },
40
+ "cano": {
41
+ "acc_red_mean": 0.11233636706547265,
42
+ "acc_red_std": 0.17822453130252297,
43
+ "noise_l2": 0.4350749568751533,
44
+ "snr_db": 15.459145628581537,
45
+ "n": 8508
46
+ },
47
+ "pgd": {
48
+ "acc_red_mean": 0.12859805082528344,
49
+ "acc_red_std": 0.17054661630339804,
50
+ "noise_l2": 0.2710759552394537,
51
+ "snr_db": 17.519880140759163,
52
+ "n": 8789
53
+ },
54
+ "carlini_wagner": {
55
+ "acc_red_mean": 0.0012902684291888971,
56
+ "acc_red_std": 0.01053508250528763,
57
+ "noise_l2": 0.0033722521182962375,
58
+ "snr_db": 53.689600150221686,
59
+ "n": 8460
60
+ },
61
+ "laplace": {
62
+ "acc_red_mean": 0.23931504343811516,
63
+ "acc_red_std": 0.22205441545003163,
64
+ "noise_l2": 0.5558844594436586,
65
+ "snr_db": 11.246155684878081,
66
+ "n": 8460
67
+ }
68
+ },
69
+ "cano_vs_best_by_epsilon": {
70
+ "0.05": {
71
+ "cano": 0.009511100010766464,
72
+ "best_baseline": 0.1035650153723957,
73
+ "best_name": "gaussian",
74
+ "ratio": 0.09183699704544784
75
+ },
76
+ "0.1": {
77
+ "cano": 0.03458333016403026,
78
+ "best_baseline": 0.19514514352881054,
79
+ "best_name": "gaussian",
80
+ "ratio": 0.17721850279571263
81
+ },
82
+ "0.15": {
83
+ "cano": 0.08379925236552174,
84
+ "best_baseline": 0.3122639332581053,
85
+ "best_name": "gaussian",
86
+ "ratio": 0.2683603306061495
87
+ },
88
+ "0.2": {
89
+ "cano": 0.13108982616476186,
90
+ "best_baseline": 0.4311992013804989,
91
+ "best_name": "gaussian",
92
+ "ratio": 0.30401221928304445
93
+ },
94
+ "0.3": {
95
+ "cano": 0.18812072228149823,
96
+ "best_baseline": 0.6090438991988152,
97
+ "best_name": "gaussian",
98
+ "ratio": 0.3088787565706958
99
+ },
100
+ "0.5": {
101
+ "cano": 0.22629037503555743,
102
+ "best_baseline": 0.7498095513657348,
103
+ "best_name": "gaussian",
104
+ "ratio": 0.3017971358505404
105
+ }
106
+ },
107
+ "significance_tests": {
108
+ "gaussian": {
109
+ "t": -80.56242745250256,
110
+ "p": 0.0,
111
+ "d": -1.2022681385245917
112
+ },
113
+ "fgsm": {
114
+ "t": -34.10775507864339,
115
+ "p": 3.4141193575201406e-247,
116
+ "d": -0.5100989131096486
117
+ },
118
+ "pgd": {
119
+ "t": -6.132014084102183,
120
+ "p": 8.865766187130507e-10,
121
+ "d": -0.09323412108850163
122
+ },
123
+ "carlini_wagner": {
124
+ "t": 57.209450720792496,
125
+ "p": 0.0,
126
+ "d": 0.8796682657971526
127
+ },
128
+ "laplace": {
129
+ "t": -41.089091426465735,
130
+ "p": 0.0,
131
+ "d": -0.630718498412547
132
+ }
133
+ },
134
+ "rl_training": {
135
+ "num_rounds": 30,
136
+ "baseline_attack_accuracy": 0.7480084875294456,
137
+ "final_attack_accuracy": 0.2079924235612858,
138
+ "accuracy_reduction": 0.5400160639681598,
139
+ "final_noise_magnitude": 0.6061090465725671
140
+ },
141
+ "best_per_dataset": {
142
+ "synth_small": {
143
+ "strategy": "gaussian",
144
+ "epsilon": 0.5,
145
+ "accuracy_reduction": 0.633686022588907
146
+ },
147
+ "synth_medium": {
148
+ "strategy": "gaussian",
149
+ "epsilon": 0.5,
150
+ "accuracy_reduction": 0.7493487779993276
151
+ },
152
+ "overlap_10u_50s": {
153
+ "strategy": "gaussian",
154
+ "epsilon": 0.5,
155
+ "accuracy_reduction": 0.46104778395017193
156
+ },
157
+ "overlap_20u_30s": {
158
+ "strategy": "gaussian",
159
+ "epsilon": 0.5,
160
+ "accuracy_reduction": 0.32083333333333336
161
+ },
162
+ "synth_10u_50s": {
163
+ "strategy": "gaussian",
164
+ "epsilon": 0.5,
165
+ "accuracy_reduction": 0.6619652261741577
166
+ },
167
+ "synth_20u_50s": {
168
+ "strategy": "gaussian",
169
+ "epsilon": 0.5,
170
+ "accuracy_reduction": 0.8145091198983414
171
+ },
172
+ "synth_50u_20s": {
173
+ "strategy": "gaussian",
174
+ "epsilon": 0.5,
175
+ "accuracy_reduction": 0.9159953366540193
176
+ },
177
+ "synth_5u_30s": {
178
+ "strategy": "gaussian",
179
+ "epsilon": 0.5,
180
+ "accuracy_reduction": 0.5233333333333333
181
+ },
182
+ "synth_large": {
183
+ "strategy": "gaussian",
184
+ "epsilon": 0.5,
185
+ "accuracy_reduction": 0.8599877580239437
186
+ },
187
+ "keystroke_cmu_51users": {
188
+ "strategy": "gaussian",
189
+ "epsilon": 0.5,
190
+ "accuracy_reduction": 0.7768332953336374
191
+ },
192
+ "fpstalker": {
193
+ "strategy": "gaussian",
194
+ "epsilon": 0.5,
195
+ "accuracy_reduction": 0.6059577787528643
196
+ }
197
+ }
198
+ }
feature_importance.json ADDED
@@ -0,0 +1,105 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "timestamp": "2026-01-31T21:13:00.196047",
3
+ "num_samples": 1000,
4
+ "num_features": 9,
5
+ "baseline_reidentification_accuracy": 1.0,
6
+ "feature_rankings": [
7
+ {
8
+ "feature": "feature_0",
9
+ "importance_mean": 0.3029,
10
+ "importance_std": 0.010885311203635808
11
+ },
12
+ {
13
+ "feature": "feature_1",
14
+ "importance_mean": 0.3022,
15
+ "importance_std": 0.012631706139710482
16
+ },
17
+ {
18
+ "feature": "feature_8",
19
+ "importance_mean": 0.0008000000000000007,
20
+ "importance_std": 0.0007483314773547889
21
+ },
22
+ {
23
+ "feature": "feature_6",
24
+ "importance_mean": 0.00040000000000000034,
25
+ "importance_std": 0.000489897948556636
26
+ },
27
+ {
28
+ "feature": "feature_7",
29
+ "importance_mean": 0.00010000000000000009,
30
+ "importance_std": 0.0003000000000000003
31
+ },
32
+ {
33
+ "feature": "feature_2",
34
+ "importance_mean": 0.0,
35
+ "importance_std": 0.0
36
+ },
37
+ {
38
+ "feature": "feature_3",
39
+ "importance_mean": 0.0,
40
+ "importance_std": 0.0
41
+ },
42
+ {
43
+ "feature": "feature_4",
44
+ "importance_mean": 0.0,
45
+ "importance_std": 0.0
46
+ },
47
+ {
48
+ "feature": "feature_5",
49
+ "importance_mean": 0.0,
50
+ "importance_std": 0.0
51
+ }
52
+ ],
53
+ "optimal_noise_weights": [
54
+ {
55
+ "feature": "feature_0",
56
+ "noise_weight_normalized": 0.49975251608645443
57
+ },
58
+ {
59
+ "feature": "feature_1",
60
+ "noise_weight_normalized": 0.49859759115657487
61
+ },
62
+ {
63
+ "feature": "feature_8",
64
+ "noise_weight_normalized": 0.0013199142055766388
65
+ },
66
+ {
67
+ "feature": "feature_6",
68
+ "noise_weight_normalized": 0.00016498927569707985
69
+ },
70
+ {
71
+ "feature": "feature_7",
72
+ "noise_weight_normalized": 0.00016498927569707985
73
+ },
74
+ {
75
+ "feature": "feature_2",
76
+ "noise_weight_normalized": 0.0
77
+ },
78
+ {
79
+ "feature": "feature_3",
80
+ "noise_weight_normalized": 0.0
81
+ },
82
+ {
83
+ "feature": "feature_4",
84
+ "noise_weight_normalized": 0.0
85
+ },
86
+ {
87
+ "feature": "feature_5",
88
+ "noise_weight_normalized": 0.0
89
+ }
90
+ ],
91
+ "top_5_critical_features": [
92
+ "feature_0",
93
+ "feature_1",
94
+ "feature_8",
95
+ "feature_6",
96
+ "feature_7"
97
+ ],
98
+ "top_5_low_impact_features": [
99
+ "feature_7",
100
+ "feature_2",
101
+ "feature_3",
102
+ "feature_4",
103
+ "feature_5"
104
+ ]
105
+ }
rl_optimization.json ADDED
@@ -0,0 +1,51 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "timestamp": "2026-03-28T02:55:15.750714",
3
+ "training_data": {
4
+ "n_users": 50,
5
+ "samples_per_user": 20,
6
+ "n_features": 9
7
+ },
8
+ "training_summary": {
9
+ "num_rounds": 30,
10
+ "baseline_attack_accuracy": 0.7480084875294456,
11
+ "final_attack_accuracy": 0.2079924235612858,
12
+ "accuracy_reduction": 0.5400160639681598,
13
+ "final_noise_magnitude": 0.6061090465725671
14
+ },
15
+ "policy_stats": {
16
+ "steps_done": 31500,
17
+ "epsilon": 0.05,
18
+ "buffer_size": 1500,
19
+ "avg_loss": 0.033748183585703376,
20
+ "min_loss": 0.031844012439250946,
21
+ "avg_reward": -0.18108615644858012,
22
+ "max_reward": -0.15310354819511224
23
+ },
24
+ "allocation_stats": {
25
+ "mean_allocation": [
26
+ 0.10881943488524157,
27
+ 0.10966671804661052,
28
+ 0.11197363517287058,
29
+ 0.11083793403945218,
30
+ 0.11224740173022113,
31
+ 0.11157460941134545,
32
+ 0.1102611414909295,
33
+ 0.11539653729543045,
34
+ 0.10922258750247048
35
+ ],
36
+ "std_allocation": [
37
+ 0.02707231986761999,
38
+ 0.023816438238360875,
39
+ 0.028405846026562206,
40
+ 0.027004999214048746,
41
+ 0.02620196115453707,
42
+ 0.025808621684249446,
43
+ 0.02530591661608039,
44
+ 0.027980012807131794,
45
+ 0.025029117068108425
46
+ ],
47
+ "num_allocations": 30000,
48
+ "gini_coefficient": 0.009180034336457588
49
+ },
50
+ "policy_path": "/var/www/aprivacy/results/cano_policy.pt"
51
+ }