4.6 Article

A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Differentially Private Byzantine-Robust Federated Learning

Xu Ma et al.

Summary: This article introduces an efficient differentially private Byzantine-robust federated learning scheme that can effectively prevent adversarial attacks and protect the privacy of individual participants.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2022)

Article Computer Science, Theory & Methods

A Survey of Android Malware Detection with Deep Neural Models

Junyang Qiu et al.

Summary: Deep Learning (DL) is a disruptive technology that has revolutionized cyber security research, especially in the detection and classification of Android malware. While offering many advantages, DL faces challenges such as choice of architecture, feature extraction, and obtaining high-quality data.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Artificial Intelligence

Publicly Verifiable Databases With All Efficient Updating Operations

Xiaofeng Chen et al.

Summary: This study presents a new verifiable database (VDB) scheme that supports all updating operations and introduces a new primitive tool called Committed Invertible Bloom Filter (CIBF).

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2021)

Article Computer Science, Hardware & Architecture

Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability

Yannan Li et al.

Summary: Monero offers high anonymity for users and transactions, but lacks user accountability, which is crucial to combat criminal activities in cryptocurrency transactions. This paper introduces Traceable Monero, a new cryptocurrency that aims to strike a balance between user anonymity and accountability. By overlaying Monero with tracing mechanisms, Traceable Monero ensures security without significantly impacting transaction efficiency.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Automation & Control Systems

DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT

Xiaoyu Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Review Computer Science, Artificial Intelligence

A Survey on Differentially Private Machine Learning [Review Article]

Maoguo Gong et al.

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE (2020)

Article Engineering, Electrical & Electronic

Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments

Yong Yu et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Article Automation & Control Systems

Data-Driven Cyber Security in Perspective-Intelligent Traffic Analysis

Rory Coulter et al.

IEEE TRANSACTIONS ON CYBERNETICS (2020)

Article Telecommunications

Security and privacy in 6G networks: New areas and new challenges

Minghao Wang et al.

DIGITAL COMMUNICATIONS AND NETWORKS (2020)

Article Computer Science, Information Systems

New publicly verifiable computation for batch matrix multiplication

Xiaoyu Zhang et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Artificial Intelligence

Virtual Adversarial Training: A Regularization Method for Supervised and Semi-Supervised Learning

Takeru Miyato et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2019)

Article Computer Science, Information Systems

Non-interactive privacy-preserving neural network prediction

Xu Ma et al.

INFORMATION SCIENCES (2019)

Proceedings Paper Computer Science, Information Systems

Privacy Risks of Securing Machine Learning Models against Adversarial Examples

Liwei Song et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Information Systems

QUOTIENT: Two-Party Secure Neural Network Training and Prediction

Nitin Agrawal et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Information Systems

Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference

Hao Chen et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Information Systems

MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples

Jinyuan Jia et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Article Computer Science, Artificial Intelligence

Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing

Xiaoyu Zhang et al.

SOFT COMPUTING (2018)

Proceedings Paper Computer Science, Theory & Methods

LEMNA: Explaining Deep Learning based Security Applications

Wenbo Guo et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Theory & Methods

Machine Learning with Membership Privacy using Adversarial Regularization

Milad Nasr et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Artificial Intelligence

On the Suitability of Lp-norms for Creating and Preventing Adversarial Examples

Mahmood Sharif et al.

PROCEEDINGS 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW) (2018)

Article Computer Science, Artificial Intelligence

Digital watermarking for deep neural networks

Yuki Nagai et al.

INTERNATIONAL JOURNAL OF MULTIMEDIA INFORMATION RETRIEVAL (2018)

Proceedings Paper Computer Science, Theory & Methods

Homomorphic Encryption for Arithmetic of Approximate Numbers

Jung Hee Cheon et al.

ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I (2017)

Proceedings Paper Computer Science, Information Systems

Oblivious Neural Network Predictions via MiniONN Transformations

Jian Liu et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

AttriInfer: Inferring User Attributes in Online Social Networks Using Markov Random Fields

Jinyuan Jia et al.

PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17) (2017)

Proceedings Paper Computer Science, Information Systems

Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning

Briland Hitaj et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Practical Secure Aggregation for Privacy-Preserving Machine Learning

Keith Bonawitz et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Artificial Intelligence

A Primer on Neural Network Models for Natural Language Processing

Yoav Goldberg

JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH (2016)

Article Computer Science, Artificial Intelligence

Participatory Cultural Mapping Based on Collective Behavior Data in Location-Based Social Networks

Dingqi Yang et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2016)

Proceedings Paper Computer Science, Theory & Methods

Two Round Multiparty Computation via Multi-key FHE

Pratyay Mukherjee et al.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II (2016)

Proceedings Paper Computer Science, Theory & Methods

Inferring User Routes and Locations using Zero-Permission Mobile Sensors

Sashank Narain et al.

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)

Article Computer Science, Theory & Methods

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Proceedings Paper Computer Science, Information Systems

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures

Matt Fredrikson et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)

Proceedings Paper Computer Science, Theory & Methods

Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds

Raef Bassily et al.

2014 55TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2014) (2014)

Proceedings Paper Computer Science, Artificial Intelligence

Neural Codes for Image Retrieval

Artem Babenko et al.

COMPUTER VISION - ECCV 2014, PT I (2014)

Proceedings Paper Computer Science, Theory & Methods

Privacy-Preserving Ridge Regression on Hundreds of Millions of Records

Valeria Nikolaenko et al.

2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2013)

Article Engineering, Electrical & Electronic

Deep Neural Networks for Acoustic Modeling in Speech Recognition

Geoffrey Hinton et al.

IEEE SIGNAL PROCESSING MAGAZINE (2012)

Proceedings Paper Computer Science, Theory & Methods

Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP

Zvika Brakerski

ADVANCES IN CRYPTOLOGY - CRYPTO 2012 (2012)