Defenses to membership inference attacks: A survey

L Hu, A Yan, H Yan, J Li, T Huang, Y Zhang… - ACM Computing …, 2023 - dl.acm.org
Machine learning (ML) has gained widespread adoption in a variety of fields, including
computer vision and natural language processing. However, ML models are vulnerable to …

Challenges and approaches for mitigating byzantine attacks in federated learning

J Shi, W Wan, S Hu, J Lu… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Recently emerged federated learning (FL) is an attractive distributed learning framework in
which numerous wireless end-user devices can train a global model with the data remained …

A privacy preserving framework for federated learning in smart healthcare systems

W Wang, X Li, X Qiu, X Zhang, V Brusic… - Information Processing & …, 2023 - Elsevier
Federated Learning (FL) is a platform for smart healthcare systems that use wearables and
other Internet of Things enabled devices. However, source inference attacks (SIAs) can infer …

Deep learning for edge computing applications: A state-of-the-art survey

F Wang, M Zhang, X Wang, X Ma, J Liu - IEEE Access, 2020 - ieeexplore.ieee.org
With the booming development of Internet-of-Things (IoT) and communication technologies
such as 5G, our future world is envisioned as an interconnected entity where billions of …

[HTML][HTML] Safeguarding cross-silo federated learning with local differential privacy

C Wang, X Wu, G Liu, T Deng, K Peng… - Digital Communications …, 2022 - Elsevier
Federated Learning (FL) is a new computing paradigm in privacy-preserving Machine
Learning (ML), where the ML model is trained in a decentralized manner by the clients …

Survey: Leakage and privacy at inference time

M Jegorova, C Kaul, C Mayor, AQ O'Neil… - … on Pattern Analysis …, 2022 - ieeexplore.ieee.org
Leakage of data from publicly available Machine Learning (ML) models is an area of
growing significance since commercial and government applications of ML can draw on …

[HTML][HTML] Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects

C Wang, J Chen, Y Yang, X Ma, J Liu - Digital Communications and …, 2022 - Elsevier
Over the past years, the emergence of intelligent networks empowered by machine learning
techniques has brought great facilitates to different aspects of human life. However, using …

AFA: Adversarial fingerprinting authentication for deep neural networks

J Zhao, Q Hu, G Liu, X Ma, F Chen… - Computer Communications, 2020 - Elsevier
With the vigorous development of deep learning, sharing trained deep neural network
(DNN) models has become a common trend in various fields. An urgent problem is to protect …

Explanation leaks: Explanation-guided model extraction attacks

A Yan, T Huang, L Ke, X Liu, Q Chen, C Dong - Information Sciences, 2023 - Elsevier
Explainable artificial intelligence (XAI) is gradually becoming a key component of many
artificial intelligence systems. However, such pursuit of transparency may bring potential …

Perceptual hashing of deep convolutional neural networks for model copy detection

H Chen, H Zhou, J Zhang, D Chen, W Zhang… - ACM Transactions on …, 2023 - dl.acm.org
In recent years, many model intellectual property (IP) proof methods for IP protection have
been proposed, such as model watermarking and model fingerprinting. However, with the …