2021
DOI: 10.1155/2021/5510857
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT

Abstract: With the rapid development of 5G technology, its high bandwidth, high reliability, low delay, and large connection characteristics have opened up a broader application field of IoT. Moreover, AIoT (Artificial Intelligence Internet of Things) has become the new development direction of IoT. Through deep learning of real-time data provided by the Internet of Things, AI can judge user habits more accurately, make devices behave in line with user expectations, and become more intelligent, thus improving product us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…Deep learning using a homomorphic encryption technique has been introduced in [18] to secure data privacy whenever customers utilize the cloud-based deep learning approach. However, the complexity is high when the depth of the networks is increased.…”
Section: Related Workmentioning
confidence: 99%
“…Deep learning using a homomorphic encryption technique has been introduced in [18] to secure data privacy whenever customers utilize the cloud-based deep learning approach. However, the complexity is high when the depth of the networks is increased.…”
Section: Related Workmentioning
confidence: 99%
“…The purpose of deep learning applied to VR is to compute the data without revealing the original content. Common approaches are secure multi-party computation and homomorphic encryption [14]. However, reducing the computational burden remains a significant challenge.…”
Section: Trend Of Developmentmentioning
confidence: 99%
“…The connection between each two nodes represents that the input node becomes an output node but the software is built according to the needs. Therefore, the construction of online education resource management information system in colleges and universities has become the focus of research, which aims to solve the construction of an allround teaching resource management information system and realize the sharing of teaching resources, so as to change teaching methods, improve teaching level, and improve the utilization rate of educational resources, which can promote teaching management under the new situation [10]. Idrissi and others believe that usually, system testing is unit testing, that is, module testing.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Since Equation ( 9) s an inverse Lafite function (most unknowns are more than a large number of equations), in order to obtain its unique solution, it is necessary to introduce a regular term z k about the characteristic graph, and the cost function is shown in Equation (10):…”
Section: Mobile Information Systemsmentioning
confidence: 99%