Privacy Attacks and Defenses in Machine Learning: A Survey

被引:0
|
作者
Liu, Wei [1 ]
Han, Xun [2 ]
He, Meiling [3 ]
机构
[1] City Univ Macau, Macau, Peoples R China
[2] Intelligent Policing Key Lab Sichuan Prov, Luzhou 646000, Sichuan, Peoples R China
[3] Jiangsu Univ, Sch Automot & Traff Engn, Zhenjiang 212013, Jiangsu, Peoples R China
关键词
Machine learning model; Means of attack; Defense strategy;
D O I
10.1007/978-981-99-9247-8_41
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As machine learning has gradually become an important technology in the field of artificial intelligence, its development is also facing challenges in terms of privacy. This article aims to summarize the attack methods and defense strategies for machine learning models in recent years. Attack methods include embedding inversion attack, attribute inference attack, membership inference attack and model extraction attack, etc. Defense measures include but are not limited to homomorphic encryption, adversarial training, differential privacy, secure multi-party computation, etc., focusing on the analysis of privacy protection issues in machine learning, and providing certain references and references for related research.
引用
收藏
页码:413 / 422
页数:10
相关论文
共 50 条
  • [21] Adversarial attacks and defenses in deep learning for image recognition: A survey
    Wang, Jia
    Wang, Chengyu
    Lin, Qiuzhen
    Luo, Chengwen
    Wu, Chao
    Li, Jianqiang
    NEUROCOMPUTING, 2022, 514 : 162 - 181
  • [22] The Survey of RFID Attacks and Defenses
    Li, Hong
    Chen, YongHui
    He, ZhangQing
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [23] A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network
    Zhang, Xiaoyu
    Chen, Chao
    Xie, Yi
    Chen, Xiaofeng
    Zhang, Jun
    Xiang, Yang
    COMPUTER STANDARDS & INTERFACES, 2023, 83
  • [24] Evaluating the Effectiveness of Attacks and Defenses on Machine Learning Through Adversarial Samples
    Gala, Viraj R.
    Schneider, Martin A.
    2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS, ICSTW, 2023, : 90 - 97
  • [25] A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning
    Sadeghi, Koosha
    Banerjee, Ayan
    Gupta, Sandeep K. S.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (04): : 450 - 467
  • [26] Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
    Goldblum, Micah
    Tsipras, Dimitris
    Xie, Chulin
    Chen, Xinyun
    Schwarzschild, Avi
    Song, Dawn
    Madry, Aleksander
    Li, Bo
    Goldstein, Tom
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (02) : 1563 - 1580
  • [27] When deep learning meets watermarking: A survey of application, attacks and defenses
    Chen, Huajie
    Liu, Chi
    Zhu, Tianqing
    Zhou, Wanlei
    Computer Standards and Interfaces, 2024, 89
  • [28] When deep learning meets watermarking: A survey of application, attacks and defenses
    Chen, Huajie
    Liu, Chi
    Zhu, Tianqing
    Zhou, Wanlei
    COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [29] How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
    Costa, Joana C.
    Roxo, Tiago
    Proenca, Hugo
    Inacio, Pedro Ricardo Morais
    IEEE ACCESS, 2024, 12 : 61113 - 61136
  • [30] Membership Inference Attacks on Machine Learning: A Survey
    Hu, Hongsheng
    Salcic, Zoran
    Sun, Lichao
    Dobbie, Gillian
    Yu, Philip S.
    Zhang, Xuyun
    ACM COMPUTING SURVEYS, 2022, 54 (11S)