Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813687
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
1,142
0
4

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 1,559 publications
(1,188 citation statements)
references
References 38 publications
2
1,142
0
4
Order By: Relevance
“…Beside these topics, there are many other examples: a methodology to estimate the uncertainty of the prediction that artificial intelligence model generates; principled way to integrate clinical or medical knowledge into the model training; development of content-based case retrieval system that searches images of similar diseases or conditions; efficient analysis of higherdimensional medical image, such as contrast enhanced images or follow-up images; and research on the privacy and security related to medical images when training and implementing artificial intelligence models [28,43,44,45,46]. These topics have not been thoroughly studied, and larger-scale studies are required.…”
Section: Discussionmentioning
confidence: 99%
“…Beside these topics, there are many other examples: a methodology to estimate the uncertainty of the prediction that artificial intelligence model generates; principled way to integrate clinical or medical knowledge into the model training; development of content-based case retrieval system that searches images of similar diseases or conditions; efficient analysis of higherdimensional medical image, such as contrast enhanced images or follow-up images; and research on the privacy and security related to medical images when training and implementing artificial intelligence models [28,43,44,45,46]. These topics have not been thoroughly studied, and larger-scale studies are required.…”
Section: Discussionmentioning
confidence: 99%
“…The PS remains at a central location. In this context, we assume that the training data reside with the workers; this serves for instance as a basis for privacy-preserving scenarios [11], where users have their photos at home, and want to contribute to the computing of a global photo classification model, but without sending their personal data to a cloud service.…”
Section: Distributed Deep Learning On Edge-devicesmentioning
confidence: 99%
“…Meanwhile, the data to be processed at edge-devices themselves is not the limiting factor (3.9MB each in this experiment, as the dataset is split among workers). Our solution is to introduce a novel compression technique for sending updates from workers to the PS, using gradient selection [11]. We thus study the model accuracy with regards to update compression, as well as with regards to device reliability.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, a data analyst who holds the global model will provide a computation result of ranking of any user's private data. Reference [2] also lets participants jointly learn a model while no input data sets of participants are revealed, but in training process participants should share small subaggregates of their models' key parameters. In the case of massive data stored in an untrusted server by a client, when the client would like to calculate a function on some part of its outsourced data, it could require the server.…”
Section: Related Workmentioning
confidence: 99%