Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

Security and privacy threats to federated learning: Issues, methods, and challenges

J Zhang, H Zhu, F Wang, J Zhao… - Security and …, 2022 - Wiley Online Library
Federated learning (FL) has nourished a promising method for data silos, which enables
multiple participants to construct a joint model collaboratively without centralizing data. The …

Machine unlearning of features and labels

A Warnecke, L Pirch, C Wressnegger… - arXiv preprint arXiv …, 2021 - arxiv.org
Removing information from a machine learning model is a non-trivial task that requires to
partially revert the training process. This task is unavoidable when sensitive data, such as …

A survey on learning to reject

XY Zhang, GS Xie, X Li, T Mei… - Proceedings of the IEEE, 2023 - ieeexplore.ieee.org
Learning to reject is a special kind of self-awareness (the ability to know what you do not
know), which is an essential factor for humans to become smarter. Although machine …

Membership inference attacks against synthetic data through overfitting detection

B Van Breugel, H Sun, Z Qian… - arXiv preprint arXiv …, 2023 - arxiv.org
Data is the foundation of most science. Unfortunately, sharing data can be obstructed by the
risk of violating data privacy, impeding research in fields like healthcare. Synthetic data is a …

SoK: Let the privacy games begin! A unified treatment of data inference privacy in machine learning

A Salem, G Cherubin, D Evans, B Köpf… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Deploying machine learning models in production may allow adversaries to infer sensitive
information about training data. There is a vast literature analyzing different types of …

A duty to forget, a right to be assured? exposing vulnerabilities in machine unlearning services

H Hu, S Wang, J Chang, H Zhong, R Sun… - arXiv preprint arXiv …, 2023 - arxiv.org
The right to be forgotten requires the removal or" unlearning" of a user's data from machine
learning models. However, in the context of Machine Learning as a Service (MLaaS) …

Lightweight privacy-preserving predictive maintenance in 6G enabled IIoT

H Li, S Li, G Min - Journal of Industrial Information Integration, 2024 - Elsevier
While the 5G is being rolled out in different industrial sectors, the 6G is expected to
implement data-driven ubiquitous machine learning for industrial information integration …

A comprehensive analysis of privacy-preserving solutions developed for online social networks

A Majeed, S Khan, SO Hwang - Electronics, 2022 - mdpi.com
Owning to the massive growth in internet connectivity, smartphone technology, and digital
tools, the use of various online social networks (OSNs) has significantly increased. On the …

Sok: Privacy-enhancing technologies in finance

C Baum, JH Chiang, B David… - Cryptology ePrint …, 2023 - eprint.iacr.org
Recent years have seen the emergence of practical advanced cryptographic tools that not
only protect data privacy and authenticity, but also allow for jointly processing data from …