Privacy and Security Issues in Deep Learning: A Survey

被引:119
|
作者
Liu, Ximeng [1 ,2 ]
Xie, Lehui [1 ,2 ]
Wang, Yaopeng [1 ,2 ]
Zou, Jian [1 ,2 ]
Xiong, Jinbo [3 ]
Ying, Zuobin [4 ]
Vasilakos, Athanasios V. [1 ,5 ,6 ]
机构
[1] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[2] Fuzhou Univ, Fujian Prov Key Lab Informat Secur Network Syst, Fuzhou 350108, Peoples R China
[3] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[5] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW 2007, Australia
[6] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, S-97187 Lulea, Sweden
基金
中国国家自然科学基金;
关键词
Deep learning; DL privacy; DL security; model extraction attack; model inversion attack; adversarial attack; poisoning attack; adversarial defense; privacy-preserving; DIFFERENTIAL EVOLUTION; NEURAL-NETWORKS; EFFICIENT;
D O I
10.1109/ACCESS.2020.3045078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep Learning (DL) algorithms based on artificial neural networks have achieved remarkable success and are being extensively applied in a variety of application domains, ranging from image classification, automatic driving, natural language processing to medical diagnosis, credit risk assessment, intrusion detection. However, the privacy and security issues of DL have been revealed that the DL model can be stolen or reverse engineered, sensitive training data can be inferred, even a recognizable face image of the victim can be recovered. Besides, the recent works have found that the DL model is vulnerable to adversarial examples perturbed by imperceptible noised, which can lead the DL model to predict wrongly with high confidence. In this paper, we first briefly introduces the four types of attacks and privacy-preserving techniques in DL. We then review and summarize the attack and defense methods associated with DL privacy and security in recent years. To demonstrate that security threats really exist in the real world, we also reviewed the adversarial attacks under the physical condition. Finally, we discuss current challenges and open problems regarding privacy and security issues in DL.
引用
收藏
页码:4566 / 4593
页数:28
相关论文
共 50 条
  • [1] A Survey on Privacy and Security Issues in Federated Learning
    Xiao, Xiong
    Tang, Zhuo
    Xiao, Bin
    Li, Ken-Li
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (05): : 1019 - 1044
  • [2] Security and Privacy Issues in Deep Learning: A Brief Review
    Ha T.
    Dang T.K.
    Le H.
    Truong T.A.
    [J]. SN Computer Science, 2020, 1 (5)
  • [3] Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures
    Mo, Kanghua
    Ye, Peigen
    Ren, Xiaojun
    Wang, Shaowei
    Li, Wenjun
    Li, Jin
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (06)
  • [4] A comprehensive review on deep learning algorithms: Security and privacy issues
    Tayyab, Muhammad
    Marjani, Mohsen
    Jhanjhi, N. Z.
    Hashem, Ibrahim Abaker Targio
    Usmani, Raja Sher Afgun
    Qamar, Faizan
    [J]. COMPUTERS & SECURITY, 2023, 131
  • [5] Security and Privacy Issues of UAV: A Survey
    Zhi, Yueyan
    Fu, Zhangjie
    Sun, Xingming
    Yu, Jingnan
    [J]. MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 95 - 101
  • [6] A survey on security and privacy issues of UAVs
    Mekdad, Yassine
    Aris, Ahmet
    Babun, Leonardo
    El Fergougui, Abdeslam
    Conti, Mauro
    Lazzeretti, Riccardo
    Uluagac, Selcuk
    [J]. COMPUTER NETWORKS, 2023, 224
  • [7] Security and Privacy Issues of UAV: A Survey
    Yueyan Zhi
    Zhangjie Fu
    Xingming Sun
    Jingnan Yu
    [J]. Mobile Networks and Applications, 2020, 25 : 95 - 101
  • [8] A Survey on Security and Privacy Issues of Bitcoin
    Conti, Mauro
    Kumar, E. Sandeep
    Lal, Chhagan
    Ruj, Sushmita
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 3416 - 3452
  • [9] Security and Privacy Issues: A Survey on FinTech
    Gai, Keke
    Qiu, Meikang
    Sun, Xiaotong
    Zhao, Hui
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 236 - 247
  • [10] Security and Privacy Issues of Fog Computing: A Survey
    Yi, Shanhe
    Qin, Zhengrui
    Li, Qun
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 685 - 695