Privacy Risks in Time Series Forecasting: User- and Record-Level Membership Inference
Nicolas Johansson 1,2, Tobias Olsson 1,2, Daniel Nilsson 2, Johan Östman 2, Fazeleh Hoseini 2
Published on arXiv
2509.04169
Membership Inference Attack
OWASP ML Top 10 — ML04
Key Finding
User-level membership inference attacks often achieve perfect detection against LSTM and N-HiTS forecasting models, with vulnerability increasing for longer prediction horizons and smaller training sets.
Deep Time Series (DTS) attack
Novel technique introduced
Membership inference attacks (MIAs) aim to determine whether specific data were used to train a model. While extensively studied on classification models, their impact on time series forecasting remains largely unexplored. We address this gap by introducing two new attacks: (i) an adaptation of multivariate LiRA, a state-of-the-art MIA originally developed for classification models, to the time-series forecasting setting, and (ii) a novel end-to-end learning approach called Deep Time Series (DTS) attack. We benchmark these methods against adapted versions of other leading attacks from the classification setting. We evaluate all attacks in realistic settings on the TUH-EEG and ELD datasets, targeting two strong forecasting architectures, LSTM and the state-of-the-art N-HiTS, under both record- and user-level threat models. Our results show that forecasting models are vulnerable, with user-level attacks often achieving perfect detection. The proposed methods achieve the strongest performance in several settings, establishing new baselines for privacy risk assessment in time series forecasting. Furthermore, vulnerability increases with longer prediction horizons and smaller training populations, echoing trends observed in large language models.
Key Contributions
- Adaptation of multivariate LiRA, a state-of-the-art MIA, from classification to the time series forecasting setting
- Novel end-to-end Deep Time Series (DTS) attack for membership inference against forecasting models
- Comprehensive evaluation under record- and user-level threat models showing that vulnerability increases with longer prediction horizons and smaller training populations
🛡️ Threat Analysis
The paper's primary contribution is two novel membership inference attacks (multivariate LiRA adaptation and DTS) that determine whether specific time series records were used to train forecasting models — the canonical ML04 threat.