A Survey of Security Protection Methods for Deep Learning Model

被引:1
|
作者
Peng H. [1 ,2 ]
Bao S. [1 ,2 ]
Li L. [1 ,2 ]
机构
[1] Beijing University of Posts and Telecommunications, Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing
[2] Beijing University of Posts and Telecommunications, National Engineering Laboratory for Disaster Backup and Recovery, Beijing
来源
基金
中国国家自然科学基金;
关键词
Data privacy; deep learning (DL); defense method; security;
D O I
10.1109/TAI.2023.3314398
中图分类号
学科分类号
摘要
In recent years, deep learning (DL) models have attracted widespread concern. Due to its own characteristics, DL has been successfully applied in the fields of object detection, superresolution reconstruction, speech recognition, natural language processing, etc., bringing high efficiency to industrial production and daily life. With the Internet of Things, 6G and other new technologies have been proposed, leading to an exponential growth in data volume. DL models currently suffer from some security issues, such as privacy issues during data collection, defense issues during model training and deployment, etc. The sensitive data of users and special institutions that are directly used as training data of DL models may lead to information leakage and serious privacy problems. In addition, DL models have encountered many malicious attacks in the real world, such as poisoning attack, exploratory attack, adversarial attack, etc., which caused model security problems. Therefore, this article discusses ways of ensuring the security and data privacy of DL models under diversified attack methods and the ways of ensuring the privacy security of edge mobile devices equipped with pretrained deep neural networks. Alternatively, this article analyzes the privacy security of DL models for typical deployment platforms such as server/cloud, edge mobile device, and web browser and, then, summarizes future research direction. © 2020 IEEE.
引用
收藏
页码:1533 / 1553
页数:20
相关论文
共 50 条
  • [11] Music Deep Learning: A Survey on Deep Learning Methods for Music Processing
    Iliadis, Lazaros Alexios
    Sotiroudis, Sotirios P.
    Kokkinidis, Kostas
    Sarigiannidis, Panagiotis
    Nikolaidis, Spiridon
    Goudos, Sotirios K.
    2022 11TH INTERNATIONAL CONFERENCE ON MODERN CIRCUITS AND SYSTEMS TECHNOLOGIES (MOCAST), 2022,
  • [12] Survey on IMD and Wearable Devices Security Threats and Protection Methods
    Yu, Jiaping
    Hou, Bingnan
    CLOUD COMPUTING AND SECURITY, PT VI, 2018, 11068 : 90 - 101
  • [13] Survey on deep learning applications in digital image security
    Bao, Zhenjie
    Xue, Ru
    OPTICAL ENGINEERING, 2021, 60 (12)
  • [14] Deep learning algorithms for cyber security applications: A survey
    Li, Guangjun
    Sharma, Preetpal
    Pan, Lei
    Rajasegarar, Sutharshan
    Karmakar, Chandan
    Patterson, Nicholas
    JOURNAL OF COMPUTER SECURITY, 2021, 29 (05) : 447 - 471
  • [15] A Survey of Security Testing Techniques for Deep Learning Frameworks
    Li, Hanqing
    Li, Xiang
    Nie, Yuanping
    Tian, Jianwen
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 404 - 415
  • [16] Towards Security Threats of Deep Learning Systems: A Survey
    He, Yingzhe
    Meng, Guozhu
    Chen, Kai
    Hu, Xingbo
    He, Jinwen
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (05) : 1743 - 1770
  • [17] A Survey of Lipreading Methods Based on Deep Learning
    Hao, Mingfeng
    Mamut, Mutelep
    Ubul, Kurban
    PROCEEDINGS OF 2020 2ND INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND MACHINE VISION AND INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION AND MACHINE LEARNING, IPMV 2020, 2020, : 31 - 39
  • [18] Deep Learning Methods in Image Matting: A Survey
    Huang, Lingtao
    Liu, Xipeng
    Wang, Xuelin
    Li, Jiangqi
    Tan, Benying
    APPLIED SCIENCES-BASEL, 2023, 13 (11):
  • [19] Survey on applications of deep learning and machine learning techniques for cyber security
    Alghamdi M.I.
    Alghamdi, Mohammed I. (mialmushilah@bu.edu.sa), 2020, International Association of Online Engineering (14): : 210 - 224
  • [20] Security protection strategy of power terminal based on deep learning
    Cai, RongYan
    Cheng, Yong
    Jia, YongLiang
    2022 6TH INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROL, ISCSIC, 2022, : 301 - 305