2021
DOI: 10.1109/jiot.2020.3033171
|View full text |Cite
|
Sign up to set email alerts
|

Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Differential privacy [46] is a statistical disclosure control algorithm that can disturb each user's real data but still can have a relatively accurate statistical result from a group of people. To prevent GAN-based attacks, anti-GAN algorithms [47,48] are invented to add noise to users' different types of data to prevent fake data generation. The noise is invisible to people but will lead the GAN to generate fake data that are different from the real data.…”
Section: Privacy Issues and Solutionsmentioning
confidence: 99%
“…Differential privacy [46] is a statistical disclosure control algorithm that can disturb each user's real data but still can have a relatively accurate statistical result from a group of people. To prevent GAN-based attacks, anti-GAN algorithms [47,48] are invented to add noise to users' different types of data to prevent fake data generation. The noise is invisible to people but will lead the GAN to generate fake data that are different from the real data.…”
Section: Privacy Issues and Solutionsmentioning
confidence: 99%
“…Possible Solution: Secure multiparty computation or mechanisms for malicious participant detection are the primary defense for FL from GAN reconstruction. Chen et al proposed a mechanism to protect collaborative training against GAN reconstruction attacks using secure multiparty computation [90]. For this sake, the authors used an improved Du-Atllah scheme, a method for multiple parties to perform calculations without knowledge of the raw data [93].…”
Section: ) Gan Reconstruction Attackmentioning
confidence: 99%
“…Generative adversarial network (GAN) is a good example of hybrid deep learning. GAN has been adapted into the IoT environment for security purposes [ 98 , 99 ]. GAN may show improved success because it can learn different attack scenarios that are combined to generate samples similar to a zero-day attack scenario.…”
Section: Intrusion Detection System (Ids) In Iotmentioning
confidence: 99%
“…Implementing distributed anomaly-based IDSs can be investigated as a solution [ 12 , 14 , 15 , 24 , 60 , 69 , 71 , 72 , 74 , 75 , 76 , 77 , 81 , 82 , 99 ] to providing a less invasive IDS. Regarding detection techniques, such as the anomaly-based IDSs, the preparation and testing time needed to accomplish the normal behavior of networks is high.…”
Section: Conclusion and Future Directionmentioning
confidence: 99%