Research Anthology on Privatizing and Securing Data 2021
DOI: 10.4018/978-1-7998-8954-0.ch059
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Challenges of Deep Learning

Abstract: Deep learning is the buzz word in recent times in the research field due to its various advantages in the fields of healthcare, medicine, automobiles, etc. A huge amount of data is required for deep learning to achieve better accuracy; thus, it is important to protect the data from security and privacy breaches. In this chapter, a comprehensive survey of security and privacy challenges in deep learning is presented. The security attacks such as poisoning attacks, evasion attacks, and black-box attacks are expl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 50 publications
0
3
0
Order By: Relevance
“…Furthermore, it presented various adversarial attacks and defense methods for many ML models. Onesimu et al (2021) presented a survey of security and privacy challenges in DL and also analyzed various techniques for preventing the DL networks from poisoning, evasion, and black box attacks and also discussed the PP computation techniques for DL such as differential privacy, homomorphic encryption (HE), secret sharing (SS), and secure multiparty computation. Boulemtafes et al (2022) reviewed the existing PP solutions for DL in a pervasive health monitoring environment.…”
Section: Adversarial Attacks In MLmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, it presented various adversarial attacks and defense methods for many ML models. Onesimu et al (2021) presented a survey of security and privacy challenges in DL and also analyzed various techniques for preventing the DL networks from poisoning, evasion, and black box attacks and also discussed the PP computation techniques for DL such as differential privacy, homomorphic encryption (HE), secret sharing (SS), and secure multiparty computation. Boulemtafes et al (2022) reviewed the existing PP solutions for DL in a pervasive health monitoring environment.…”
Section: Adversarial Attacks In MLmentioning
confidence: 99%
“…Onesimu et al (2021) presented a survey of security and privacy challenges in DL and also analyzed various techniques for preventing the DL networks from poisoning, evasion, and black box attacks and also discussed the PP computation techniques for DL such as differential privacy, homomorphic encryption (HE), secret sharing (SS), and secure multiparty computation.…”
Section: Introductionmentioning
confidence: 99%
“…Many of such applications use edge detection algorithm for localizing and visualizing target area in image and data. Before applying machine learning, if one wishes to implant privacy-preserving and securityrelated data [40]- [42] in the detected edge information that could be a promising technique to be used in the tele-medicine applications. Therefore, it is interesting to associate an edge detection method to divide the image contents into the edge and non-edge areas and to hide the data there [5,6,10,31,43].…”
Section: Introductionmentioning
confidence: 99%