When machine learning meets privacy: A survey and outlook

B Liu, M Ding, S Shaham, W Rahayu… - ACM Computing …, 2021 - dl.acm.org
The newly emerged machine learning (eg, deep learning) methods have become a strong
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …

Pervasive AI for IoT applications: A survey on resource-efficient distributed artificial intelligence

E Baccour, N Mhaisen, AA Abdellatif… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Artificial intelligence (AI) has witnessed a substantial breakthrough in a variety of Internet of
Things (IoT) applications and services, spanning from recommendation systems and speech …

Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning

M Nasr, R Shokri, A Houmansadr - 2019 IEEE symposium on …, 2019 - ieeexplore.ieee.org
Deep neural networks are susceptible to various inference attacks as they remember
information about their training data. We design white-box inference attacks to perform a …

Machine learning with membership privacy using adversarial regularization

M Nasr, R Shokri, A Houmansadr - … of the 2018 ACM SIGSAC conference …, 2018 - dl.acm.org
Machine learning models leak significant amount of information about their training sets,
through their predictions. This is a serious privacy concern for the users of machine learning …

Model inversion attacks against collaborative inference

Z He, T Zhang, RB Lee - Proceedings of the 35th Annual Computer …, 2019 - dl.acm.org
The prevalence of deep learning has drawn attention to the privacy protection of sensitive
data. Various privacy threats have been presented, where an adversary can steal model …

{CSI}{NN}: Reverse engineering of neural network architectures through electromagnetic side channel

L Batina, S Bhasin, D Jap, S Picek - 28th USENIX Security Symposium …, 2019 - usenix.org
Machine learning has become mainstream across industries. Numerous examples prove the
validity of it for security applications. In this work, we investigate how to reverse engineer a …

[PDF][PDF] Comprehensive privacy analysis of deep learning

M Nasr, R Shokri, A Houmansadr - Proceedings of the 2019 IEEE …, 2018 - researchgate.net
Deep neural networks are susceptible to various inference attacks as they remember
information about their training data. We design white-box inference attacks to perform a …

[HTML][HTML] A systematic review on model watermarking for neural networks

F Boenisch - Frontiers in big Data, 2021 - frontiersin.org
Machine learning (ML) models are applied in an increasing variety of domains. The
availability of large amounts of data and computational resources encourages the …

Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead

M Shafique, M Naseer, T Theocharides… - IEEE Design & …, 2020 - ieeexplore.ieee.org
Currently, machine learning (ML) techniques are at the heart of smart cyber-physical
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …

Privacy side channels in machine learning systems

E Debenedetti, G Severi, N Carlini… - arXiv preprint arXiv …, 2023 - arxiv.org
Most current approaches for protecting privacy in machine learning (ML) assume that
models exist in a vacuum, when in reality, ML models are part of larger systems that include …