Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (4): 29-39.doi: 10.11959/j.issn.2096-109x.2023051
• Papers • Previous Articles
Yifan HE1,2, Jie ZHANG2,3, Weiming ZHANG2,3, Nenghai YU2,3
Revised:
2023-02-06
Online:
2023-08-01
Published:
2023-08-01
Supported by:
CLC Number:
Yifan HE, Jie ZHANG, Weiming ZHANG, Nenghai YU. Privacy leakage risk assessment for reversible neural network[J]. Chinese Journal of Network and Information Security, 2023, 9(4): 29-39.
[1] | SHOKRI R , STRONATI M , SONG C ,et al. Membership inference attacks against machine learning models[C]// IEEE Symposium on Security and Privacy. 2017 |
[2] | KHOSRAVY M , NAKAMURA K , HIROSE Y ,et al. Model inversion attack:analysis under gray-box scenario on deep learning based face recognition system[J]. KSII Transactions on Internet and Information Systems, 2021,15(3): 1100-1119. |
[3] | TRUONG J B , MAINI P , WALLS R ,et al. Data-free model extraction[C]// IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2021 |
[4] | 谭作文, 张连福 . 机器学习隐私保护研究综述[J]. 软件学报, 2020,31(7): 30. |
TAN Z W , ZHANG L F . Survey on privacy preserving techniques for machine learning[J]. Journal of Software. 2020,31(7): 30. | |
[5] | DINH L , KRUEGER D , BENGIO Y . NICE:non-linear independent components estimation[J]. Computer Science, 2014. |
[6] | GOMEZ A N , REN M , URTASUN R ,et al. The reversible residual network:backpropagation without storing activations[C]// International Conference on Neural Information Processing Systems(NIPS). 2017: 2211-2221. |
[7] | JACOBSEN J H , SMEULDERS A , OYALLON E . i-RevNet:deep invertible networks[C]// International Conference on Learning Representations. 2018. |
[8] | MELIS L , SONG C Z , DE-CRISTOFARO E ,et al. Exploiting unintended feature leakage in collaborative learning[C]// Proc of the IEEE Symp on Security and Privacy. 2019 |
[9] | TRAMèR F , ZHANG F , JUELS A ,et al. Stealing machine learning models via prediction APIs[C]// Proc of the USENIX Security Symposium. 2016: 601-618. |
[10] | SALEM A , ZHANG Y , HUMBERT M ,et al. ML-Leaks:model and data independent membership inference attacks and defenses on machine learning models[C]// Network and Distributed Systems Security (NDSS) Symposium. 2019. |
[11] | CHEN S I , KAHLA M , JIA R X ,et al. Knowledge-enriched distributional model inversion attacks[C]// Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV). 2021: 16178-16187. |
[12] | SZEGEDY C , VANHOUCKE V , IOFFE S ,et al. Rethinking the inception architecture for computer vision[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2016: 2818-2826. |
[13] | LIU Y , WEN R , HE X ,et al. ML-doctor:holistic risk assess ment of inference attacks against machine learning models[C]// USENIX Security Symposium. 2022. |
[14] | MEJIA F A , GAMBLE P , HAMPEL-ARIAS Z ,et al. Robust or private? adversarial training makes models more vulnerable to privacy attacks[R]. 2019. |
[15] | AL-RUBAIE M , CHANG J M . Privacy-preserving machine learning:threats and solutions[J]. IEEE Security & Privacy, 2019,17(2): 49-58. |
[16] | ABADI M , CHU A , GOODFELLOW I ,et al. Deep learning with differential privacy[C]// ACM SIGSAC Conference on Computer and Communications Security (CCS). 2016: 308-318. |
[17] | CHOO C A C , TRAMER F , CARLINI N ,et al. Label-only membership inference attacks[J]. arXiv Preprint arXiv:2007.14321, 2020. |
[18] | CHENG Z , LI Z , ZHANG J ,et al. Differentially private machine learning model against model extraction attack[C]// 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics). 2020. |
[19] | JIA J Y , SALEM A , BACKES M ,et al. MemGuard:defending againstblack-box membership inference attacks via adversarial examples[C]// Proceedings of 2019 ACM SIGSAC Conference on Computer and Communications Security. 2019: 259-274. |
[20] | NASR M , SHOKRI R , HOUMANSADR A . Comprehensive privacy analysis of deep learning:passive and active white-box inference attacks against centralized and federated learning[C]// Proceedings of 2019 IEEE Symposium on Security and Privacy. 2019: 739-753. |
[21] | ZHANG G , LIU B , TIAN H ,et al. How does a deep learning model architecture impact its privacy[J]. arXiv Preprint arXiv:2210.11049, 2022. |
[1] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
[2] | Zhe SUN, Hong NING, Lihua YIN, Binxing FANG. Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 178-188. |
[3] | Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG. Two-party cooperative blind signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51. |
[4] | Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG. Dynamic and efficient vehicular cloud management scheme with privacy protection [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83. |
[5] | Chenxin LU, Bing CHEN, Ning DING, Liquan CHEN, Ge WU. Identity-based anonymous cloud auditing scheme with compact tags [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 156-168. |
[6] | Shengzhi MING, Jianming ZHU, Zhiyuan SUI, Xian ZHANG. Online medical privacy protection strategy under information value-added mechanism [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 169-177. |
[7] | Xian ZHANG, Jianming ZHU, Zhiyuan SUI, Shengzhi MING. Analysis on anonymity and regulation of digital currency transactions based on game theory [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 150-157. |
[8] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[9] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[10] | Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU. Fast handover authentication scheme in 5G mobile edge computing scenarios [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 154-168. |
[11] | Zhensheng GAO, Lifeng CAO, Xuehui DU. Research progress of access control based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87. |
[12] | Chuanxin ZHOU, Yi SUN, Degang WANG, Huawei GE. Survey of federated learning research [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 77-92. |
[13] | Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI. Research on extended access control mechanism in online social network [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131. |
[14] | Zhanhui YUAN, Zhi YANG, Hongqi ZHANG, Shuyuan JIN, Xuehui DU. Android complex information flow analysis method based on communicating sequential process [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 156-168. |
[15] | Kui REN, Quanrun MENG, Shoukun YAN, Zhan QIN. Survey of artificial intelligence data security and privacy protection [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 1-10. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|