2019
DOI: 10.1007/978-3-030-30619-9_4
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Deep Learning Techniques for Privacy-Preserving

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 35 publications
(24 citation statements)
references
References 35 publications
0
23
0
1
Order By: Relevance
“…Akhtar et al [22] reviewed the adversarial example attacks and defenses on DL in the field of computer vision. Tanuwidjaja et al [23] and Boulemtafes et al [24] studied several privacypreserving techniques on DL. Yuan et al [25] presented a review on adversarial examples for DL, in which they summarize the adversarial example generation methods and discuss the corresponding defense methods.…”
Section: Introductionmentioning
confidence: 99%
“…Akhtar et al [22] reviewed the adversarial example attacks and defenses on DL in the field of computer vision. Tanuwidjaja et al [23] and Boulemtafes et al [24] studied several privacypreserving techniques on DL. Yuan et al [25] presented a review on adversarial examples for DL, in which they summarize the adversarial example generation methods and discuss the corresponding defense methods.…”
Section: Introductionmentioning
confidence: 99%
“…• To the best to our knowledge, this is the first PPDL survey paper to provides a complete discussion and analysis about PPDL on MLaaS. This paper is an extension of our previous version [1] by improving the classification of PPDL into a wider scope, adding latest publications of 28 papers in total with our analysis of the weakness of each method. We present comparison tables (Tables 8 and 9), based on the privacy parameter and performance level, respectively.…”
Section: Introductionmentioning
confidence: 94%
“…Due to the availability of huge amount of labeled data, and ability to work in a decentralized fashion, these techniques can be utilized for users' privacy preservation with enhanced usefulness. The heterogeneous federated transfer learning (HFTL) framework [298], privacy-preserving deep learning (PPDL) technique [299], deep transfer learning (DTL) method [300], adaptive privacy preserving federated learning (APPFL) method [301], block-chain-enable privacy preserving (BCEPP) architectures [302], [303], secure collaborative few-shot learning (SCFSL) framework [304], searchable encryption (SE) methods leveraging ciphertext-policy attribute-based encryption (CP-ABE) [305], [306], data resource protection solution leveraging smart contracts [307], improving cyber security solutions utilizing AI's potential [308], and computational intelligence based methods for information security [309], to name a few have already been used in practical applications related to the PPDP. Hence, devising robust and lightweight techniques which involve less parameters and can co-work with the traditional anonymization approaches to scale up privacy preservation with enhanced data utility is a promising area of research for the future.…”
Section: Promising Open Research Directionsmentioning
confidence: 99%