Privacy-Preserving Data-Driven Learning Models for Emerging Communication Networks: A Comprehensive Survey

MM Fouda, ZM Fadlullah, MI Ibrahem… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the proliferation of Beyond 5G (B5G) communication systems and heterogeneous
networks, mobile broadband users are generating massive volumes of data that undergo …

Towards practical secure neural network inference: the journey so far and the road ahead

ZÁ Mann, C Weinert, D Chabal, JW Bos - ACM Computing Surveys, 2023 - dl.acm.org
Neural networks (NNs) have become one of the most important tools for artificial
intelligence. Well-designed and trained NNs can perform inference (eg, make decisions or …

High accuracy and high fidelity extraction of neural networks

M Jagielski, N Carlini, D Berthelot, A Kurakin… - 29th USENIX security …, 2020 - usenix.org
In a model extraction attack, an adversary steals a copy of a remotely deployed machine
learning model, given oracle prediction access. We taxonomize model extraction attacks …

Distributed learning of deep neural network over multiple agents

O Gupta, R Raskar - Journal of Network and Computer Applications, 2018 - Elsevier
In domains such as health care and finance, shortage of labeled data and computational
resources is a critical issue while developing machine learning algorithms. To address the …

Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy

R Gilad-Bachrach, N Dowlin, K Laine… - International …, 2016 - proceedings.mlr.press
Applying machine learning to a problem which involves medical, financial, or other types of
sensitive data, not only requires accurate predictions but also careful attention to …

{XONN}:{XNOR-based} oblivious deep neural network inference

MS Riazi, M Samragh, H Chen, K Laine… - 28th USENIX Security …, 2019 - usenix.org
Advancements in deep learning enable cloud servers to provide inference-as-a-service for
clients. In this scenario, clients send their raw data to the server to run the deep learning …

Secure outsourced matrix computation and application to neural networks

X Jiang, M Kim, K Lauter, Y Song - … of the 2018 ACM SIGSAC conference …, 2018 - dl.acm.org
Homomorphic Encryption (HE) is a powerful cryptographic primitive to address privacy and
security issues in outsourcing computation on sensitive data to an untrusted computation …

Deepsecure: Scalable provably-secure deep learning

BD Rouhani, MS Riazi, F Koushanfar - Proceedings of the 55th annual …, 2018 - dl.acm.org
This paper presents DeepSecure, the an scalable and provably secure Deep Learning (DL)
framework that is built upon automated design, efficient logic synthesis, and optimization …

Oblivious neural network predictions via minionn transformations

J Liu, M Juuti, Y Lu, N Asokan - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
Machine learning models hosted in a cloud service are increasingly popular but risk privacy:
clients sending prediction requests to the service need to disclose potentially sensitive …

Privacy-preserving classification on deep neural network

H Chabanne, A De Wargny, J Milgram… - Cryptology ePrint …, 2017 - eprint.iacr.org
Neural Networks (NN) are today increasingly used in Machine Learning where they have
become deeper and deeper to accurately model or classify high-level abstractions of data …