Privacy Attacks and Defenses in Machine Learning: A Survey

被引:0
|
作者
Liu, Wei [1 ]
Han, Xun [2 ]
He, Meiling [3 ]
机构
[1] City Univ Macau, Macau, Peoples R China
[2] Intelligent Policing Key Lab Sichuan Prov, Luzhou 646000, Sichuan, Peoples R China
[3] Jiangsu Univ, Sch Automot & Traff Engn, Zhenjiang 212013, Jiangsu, Peoples R China
关键词
Machine learning model; Means of attack; Defense strategy;
D O I
10.1007/978-981-99-9247-8_41
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As machine learning has gradually become an important technology in the field of artificial intelligence, its development is also facing challenges in terms of privacy. This article aims to summarize the attack methods and defense strategies for machine learning models in recent years. Attack methods include embedding inversion attack, attribute inference attack, membership inference attack and model extraction attack, etc. Defense measures include but are not limited to homomorphic encryption, adversarial training, differential privacy, secure multi-party computation, etc., focusing on the analysis of privacy protection issues in machine learning, and providing certain references and references for related research.
引用
收藏
页码:413 / 422
页数:10
相关论文
共 50 条
  • [1] Survey on Privacy Attacks and Defenses in Machine Learning
    Liu R.-X.
    Chen H.
    Guo R.-Y.
    Zhao D.
    Liang W.-J.
    Li C.-P.
    Chen, Hong (chong@ruc.edu.cn), 1600, Chinese Academy of Sciences (31): : 866 - 892
  • [2] Visual privacy attacks and defenses in deep learning: a survey
    Zhang, Guangsheng
    Liu, Bo
    Zhu, Tianqing
    Zhou, Andi
    Zhou, Wanlei
    ARTIFICIAL INTELLIGENCE REVIEW, 2022, 55 (06) : 4347 - 4401
  • [3] Visual privacy attacks and defenses in deep learning: a survey
    Guangsheng Zhang
    Bo Liu
    Tianqing Zhu
    Andi Zhou
    Wanlei Zhou
    Artificial Intelligence Review, 2022, 55 : 4347 - 4401
  • [4] A Survey of Privacy Attacks in Machine Learning
    Rigaki, Maria
    Garcia, Sebastian
    ACM COMPUTING SURVEYS, 2024, 56 (04)
  • [5] Privacy and Robustness in Federated Learning: Attacks and Defenses
    Lyu, Lingjuan
    Yu, Han
    Ma, Xingjun
    Chen, Chen
    Sun, Lichao
    Zhao, Jun
    Yang, Qiang
    Yu, Philip S.
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (07) : 8726 - 8746
  • [6] Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems
    Wang, Zhibo
    Ma, Jingjing
    Wang, Xue
    Hu, Jiahui
    Qin, Zhan
    Ren, Kui
    ACM COMPUTING SURVEYS, 2023, 55 (07)
  • [7] A survey on blockchain systems: Attacks, defenses, and privacy preservation
    Chen, Yourong
    Chen, Hao
    Zhang, Yang
    Han, Meng
    Siddula, Madhuri
    Cai, Zhipeng
    HIGH-CONFIDENCE COMPUTING, 2022, 2 (02):
  • [8] A Survey on Privacy Attacks and Defenses in Graph Neural Networks
    Luo, Lanhua
    Ren, Wang
    Huang, Huasheng
    Wang, Fengling
    INFORMATION TECHNOLOGY AND CONTROL, 2024, 53 (04):
  • [9] A Survey of Federated Learning: Review, Attacks, Defenses
    Yao, Zhongyi
    Cheng, Jieren
    Fu, Cebin
    Huang, Zhennan
    BIG DATA AND SECURITY, ICBDS 2023, PT I, 2024, 2099 : 166 - 177
  • [10] A Detailed Survey on Federated Learning Attacks and Defenses
    Sikandar, Hira Shahzadi
    Waheed, Huda
    Tahir, Sibgha
    Malik, Saif U. R.
    Rafique, Waqas
    ELECTRONICS, 2023, 12 (02)