2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA) 2018
DOI: 10.1109/isca.2018.00053
|View full text |Cite
|
Sign up to set email alerts
|

Guaranteeing Local Differential Privacy on Ultra-Low-Power Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 32 publications
0
14
0
Order By: Relevance
“…In recent years, there has been a considerable research interest in privacy-preserving machine learning [21][22][23][24][25][26][27]. This technique combines machine learning techniques (such as logistic regression, SVM, artificial neural networks, etc.)…”
Section: Privacy-preserving Machine Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, there has been a considerable research interest in privacy-preserving machine learning [21][22][23][24][25][26][27]. This technique combines machine learning techniques (such as logistic regression, SVM, artificial neural networks, etc.)…”
Section: Privacy-preserving Machine Learningmentioning
confidence: 99%
“…Choi et al [27] propose a privacy-preserving scheme for application in Internet of Things (IoT) systems which use ultra-low power. This proposed scheme uses local Differential Privacy.…”
Section: Privacy-preserving Machine Learningmentioning
confidence: 99%
“…There are many potential attacks, such as NILM, that can reveal the private data before they reach the trusted data curator. 20,21 Furthermore, electric power grid users might be sensitive military industrial enterprises, and electric power provider cannot be regarded as trusted third party, moreover the widely uncontrollable channels. 22 In summary, in Power IoTs, the support of trusted data curator is inadequate, therefore local obfuscation is a better choice for users’ behavior privacy preserving in Power IoTs.…”
Section: Introductionmentioning
confidence: 99%
“…Many researches had indicated that naive hardware implementation of LDP mechanism cannot guarantee behavior privacy of individual user in Power IoT systems. 20 Some advanced obfuscation mechanisms 2428 combined with distribution estimation or machine learning are able to achieve the trade-off; however, the following problem is that the naive Power IoT device cannot endure the complex and high computational cost algorithms, especially the procedure of model training that high-computing resource consumption. In summary, Power IoTs with naive hardware cannot guarantee behavior privacy completely through directly applying existing local obfuscation mechanisms.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation