4.7 Article

Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2023.3274391

关键词

Data models; Servers; Computational modeling; Training; Privacy; Differential privacy; Image reconstruction; Split learning (SL); binarization; privacy preservation; leakage loss; differential privacy

向作者/读者索取更多资源

This paper proposes a split learning (SL) approach for training deep learning models without sharing raw data, thereby preserving data privacy. The SL local layers are binarized to enable faster computation and reduced memory usage. Experimental results demonstrate the effectiveness of the binarized SL models in lightweight IoT/mobile applications with high privacy-preservation requirements.
Split learning (SL) enables data privacy preservation by allowing clients to collaboratively train a deep learning model with the server without sharing raw data. However, SL still has limitations such as potential data privacy leakage and high computation for clients. In this paper, we propose to binarize the SL local layers for faster computation (up to 17.5 times less forward-propagation time in both training and inference phases on mobile devices) and reduced memory usage (up to 32 times less memory and bandwidth requirements). More importantly, the binarized SL (B-SL) model can reduce privacy leakage from SL smashed data with merely a small degradation in model accuracy. To further enhance privacy preservation, we also propose two novel approaches: 1) training with additional local leak loss and 2) applying differential privacy, which could be integrated separately or concurrently into the B-SL model. Experimental results with different datasets have affirmed the benefits of the B-SL models compared with several benchmark models. The effectiveness of B-SL models against feature-space hijacking attack (FSHA) is also illustrated. Our results have demonstrated B-SL models are promising for lightweight IoT/mobile applications with high privacy-preservation requirements such as mobile healthcare applications.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据