Netinfo Security ›› 2026, Vol. 26 ›› Issue (1): 38-48.doi: 10.3969/j.issn.1671-1122.2026.01.003

Previous Articles     Next Articles

Member Inference Risk Assessment for Capsule Network

WANG Yajie1, LU Jinbiao1, TAN Dongli2, FAN Qing3(), ZHU Liehuang1   

  1. 1. School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China
    2. School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
    3. School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China
  • Received:2025-07-07 Online:2026-01-10 Published:2026-02-13

Abstract:

To evaluate the defense capability of capsule network against membership inference attacks, this study implemented membership inference attacks on the FashionMNIST and CIFAR-10 datasets and selected LeNet, VGG16, and ResNet18 as shadow models. Additionally, this study tested the impact of the number of shadow models on the attack effectiveness, explored the relationship between overfitting and membership inference attacks, and tested the defensive effect of differential privacy against membership inference attacks. The experimental results show that the attack success rate of membership inference attacks can reach up to 94.8%, and there is no significant advantage in the attack success rate when the number of shadow models is between 1 and 5. Furthermore, the study found that the effectiveness of membership inference attacks increased with the increase in overfitting, and the application of differential privacy technology can effectively enhance the defensive capability of the capsule network, but the training time of the capsule network will increase by more than 133%. These findings indicate that common strategies and defensive measures against membership inference attacks are applicable to capsule network, highlighting the importance of prioritizing security issues in the design and application of capsule network.

Key words: capsule network, membership inference attack, machine learning, robustness

CLC Number: