A Survey of Security Protection Methods for Deep Learning Model

被引:1
|
作者
Peng H. [1 ,2 ]
Bao S. [1 ,2 ]
Li L. [1 ,2 ]
机构
[1] Beijing University of Posts and Telecommunications, Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing
[2] Beijing University of Posts and Telecommunications, National Engineering Laboratory for Disaster Backup and Recovery, Beijing
来源
基金
中国国家自然科学基金;
关键词
Data privacy; deep learning (DL); defense method; security;
D O I
10.1109/TAI.2023.3314398
中图分类号
学科分类号
摘要
In recent years, deep learning (DL) models have attracted widespread concern. Due to its own characteristics, DL has been successfully applied in the fields of object detection, superresolution reconstruction, speech recognition, natural language processing, etc., bringing high efficiency to industrial production and daily life. With the Internet of Things, 6G and other new technologies have been proposed, leading to an exponential growth in data volume. DL models currently suffer from some security issues, such as privacy issues during data collection, defense issues during model training and deployment, etc. The sensitive data of users and special institutions that are directly used as training data of DL models may lead to information leakage and serious privacy problems. In addition, DL models have encountered many malicious attacks in the real world, such as poisoning attack, exploratory attack, adversarial attack, etc., which caused model security problems. Therefore, this article discusses ways of ensuring the security and data privacy of DL models under diversified attack methods and the ways of ensuring the privacy security of edge mobile devices equipped with pretrained deep neural networks. Alternatively, this article analyzes the privacy security of DL models for typical deployment platforms such as server/cloud, edge mobile device, and web browser and, then, summarizes future research direction. © 2020 IEEE.
引用
收藏
页码:1533 / 1553
页数:20
相关论文
共 50 条
  • [31] A survey on deep learning methods for scene flow estimation
    Liu, Jiajie
    Li, Han
    Wu, Ruihong
    Zhao, Qingyun
    Guo, Yiyou
    Chen, Long
    PATTERN RECOGNITION, 2020, 106 (106)
  • [32] A Comprehensive Survey on Deep Graph Representation Learning Methods
    Chikwendu I.A.
    Zhang X.
    Agyemang I.O.
    Adjei-Mensah I.
    Chima U.C.
    Ejiyi C.J.
    Journal of Artificial Intelligence Research, 2023, 78 : 287 - 356
  • [33] Survey on deep learning methods in human action recognition
    Koohzadi, Maryam
    Charkari, Nasrollah Moghadam
    IET COMPUTER VISION, 2017, 11 (08) : 623 - 632
  • [34] Deep learning and ensemble methods for anomaly detection in ICS security
    Md. Alamgir Hossain
    Tahmid Hasan
    Vincent Karovic, jr.
    Hikmat A. M. Abdeljaber
    Md. Alimul Haque
    Sultan Ahmad
    Aasim Zafar
    Jabeen Nazeer
    B. K. Mishra
    International Journal of Information Technology, 2025, 17 (3) : 1761 - 1775
  • [35] Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
    Liu, Hongyu
    Lang, Bo
    APPLIED SCIENCES-BASEL, 2019, 9 (20):
  • [36] Survey of continuous deep learning methods and techniques used for incremental learning
    Leo, Justin
    Kalita, Jugal
    NEUROCOMPUTING, 2024, 582
  • [37] Survey of Deep Learning Model Compression and Acceleration
    Gao H.
    Tian Y.-L.
    Xu F.-Y.
    Zhong S.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 68 - 92
  • [38] Generalization of Deep Learning for Cyber-Physical System Security: A Survey
    Wickramasinghe, Chathurika S.
    Marino, Daniel L.
    Amarasinghe, Kasun
    Manic, Milos
    IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 745 - 751
  • [39] The Testing and Repairing Methods for Machine Learning Model Security
    Zhang X.-Y.
    Shen C.
    Lin C.-H.
    Li Q.
    Wang Q.
    Li Q.
    Guan X.-H.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2022, 50 (12): : 2884 - 2918
  • [40] A brief survey of deep learning methods for android Malware detection
    Joomye, Abdurraheem
    Ling, Mee Hong
    Yau, Kok-Lim Alvin
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2025, 16 (02) : 711 - 733