2021
DOI: 10.3390/electronics10111367
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Deep Neural Network Methods: Computational and Perceptual Methods—An Overview

Abstract: Privacy-preserving deep neural networks have become essential and have attracted the attention of many researchers due to the need to maintain the privacy and the confidentiality of personal and sensitive data. The importance of privacy-preserving networks has increased with the widespread use of neural networks as a service in unsecured cloud environments. Different methods have been proposed and developed to solve the privacy-preserving problem using deep neural networks on encrypted data. In this article, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…Some of these techniques implement ML techniques such as artificial neural network (ANN). With the help of pooling layers, the hidden features can be derived [ 10 ]. Generally, the output of the final pooling layer was implemented for the purposes of regression and classification.…”
Section: Introductionmentioning
confidence: 99%
“…Some of these techniques implement ML techniques such as artificial neural network (ANN). With the help of pooling layers, the hidden features can be derived [ 10 ]. Generally, the output of the final pooling layer was implemented for the purposes of regression and classification.…”
Section: Introductionmentioning
confidence: 99%
“…To the best of our knowledge, Refs. [5,40,41] are the most related surveys to the current study that deal with the JPEG-compatible perceptual encryption schemes. In [40,41], the authors studied CPE and noncompressible perceptual encryption methods mainly from a PPML application point of view.…”
Section: Introductionmentioning
confidence: 99%
“…[5,40,41] are the most related surveys to the current study that deal with the JPEG-compatible perceptual encryption schemes. In [40,41], the authors studied CPE and noncompressible perceptual encryption methods mainly from a PPML application point of view. On the other hand, the authors in [5] focused on joint compression and encryption algorithms in general and covered only two CPE schemes.…”
Section: Introductionmentioning
confidence: 99%
“…It has become a trendy and interesting topic. 1,2 Although it faces many challenges, especially those related to data availability and privacy, 3,4 machine learning has been able to develop and prove itself in many fields and applications, such as image processing, computer vision [5][6][7][8] ... Several types of machine learning algorithms were used for data classification; different neural networks architecture were applied, [9][10][11] new models and approaches are still developed. A new machine learning approach for data classification based on generative adversarial networks (GANs) has been presented in this paper, where the classification problem has been converted to identity identification problem.…”
Section: Introductionmentioning
confidence: 99%