Privacy-Preserving Deep Neural Network Methods: Computational and Perceptual Methods—An Overview
نویسندگان
چکیده
منابع مشابه
Privacy-Preserving Classification on Deep Neural Network
Neural Networks (NN) are today increasingly used in Machine Learning where they have become deeper and deeper to accurately model or classify high-level abstractions of data. Their development however also gives rise to important data privacy risks. This observation motives Microsoft researchers to propose a framework, called Cryptonets. The core idea is to combine simplifications of the NN wit...
متن کاملPrivacy-preserving generative deep neural networks support clinical data sharing
Though it is widely recognized that data sharing enables faster scientific progress, the sensible need to protect participant privacy hampers this practice in medicine. We train deep neural networks that generate synthetic subjects closely resembling study participants. Using the SPRINT trial as an example, we show that machine-learning models built from simulated participants generalize to the...
متن کاملPrivyNet: A Flexible Framework for Privacy-Preserving Deep Neural Network Training
Massive data exist among user local platforms that usually cannot support deep neural network (DNN) training due to computation and storage resource constraints. Cloud-based training schemes can provide beneficial services, but rely on excessive user data collection, which can lead to potential privacy risks and violations. In this paper, we propose PrivyNet, a flexible framework to enable DNN ...
متن کاملPrivacy-preserving Network Provenance
Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Network provenance significantly aids network administrators in these tasks by explaining system behavior and revealing the dependencies between system states. Although resourceful, network provenance can sometimes be too rich, revealing potentially sensitive...
متن کاملPrivacy-Preserving Network Aggregation
Consider the scenario where information about a large network is distributed across several different parties (examples may include Facebook social networks or email communications networks). Intuitively, we would expect that the aggregate network formed by combining the individual private networks would be a more faithful representation of the underlying network as a whole. Thus, it would be u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2021
ISSN: 2079-9292
DOI: 10.3390/electronics10111367