[25] |
HAN P Y , LIU C Y , WANG J H ,et al. Research on data encryption system and technology for cloud storage[J]. Journal on Communica-tions, 2020,41(8): 55-65.
|
[26] |
CAO Y Z , YANG J F . Towards making systems forget with machine unlearning[C]// Proceedings of 2015 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2015: 463-480.
|
[27] |
NASR M , SHOKRI R , HOUMANSADR A . Machine learning with membership privacy using adversarial regularization[C]// Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2018: 634-646.
|
[28] |
张佳乐, 赵彦超, 陈兵 ,等. 边缘计算数据安全与隐私保护研究综述[J]. 通信学报, 2018,39(3): 1-21.
|
|
ZHANG J L , ZHAO Y C , CHEN B ,et al. Survey on data security and privacy-preserving for the research of edge computing[J]. Journal on Communications, 2018,39(3): 1-21.
|
[29] |
LIU K , DOLAN-GAVITT B , GARG S . Fine-pruning:defending against backdooring attacks on deep neural networks[C]// Research in Attacks,Intrusions,and Defenses. Cham:Springer International Publishing, 2018: 273-294.
|
[1] |
DELACROIX S , MONTGOMERY J . From research data ethics prin-ciples to practice:data trusts as a governance tool[J]. SSRN Electronic Journal,2020:doi.org/10.2139/ssrn.3736090.
|
[2] |
O’HARA K . Data trusts:ethics,architecture and governance for trustworthy data stewardship[R]. 2019.
|
[3] |
CARLINI N , LIU C , ERLINGSSON ú ,et al. The secret sharer:evaluating and testing unintended memorization in neural networks[C]// Proceedings of the 28th USENIX Security Symposium. Berkeley:USENIX Association, 2019: 267-284.
|
[4] |
CARLINI N , TRAMER F , WALLACE E ,et al. Extracting training data from large language models[C]// Proceedings of the 30th USENIX Security Symposium. Berkeley:USENIX Association, 2021: 2633-2650.
|
[5] |
ZHANG Y H , JIA R X , PEI H Z ,et al. The secret revealer:generative model-inversion attacks against deep neural networks[C]// Proceedings of 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2020: 250-258.
|
[6] |
ZHU L G , LIU Z J , HAN S . Deep leakage from gradients[J]. arXiv Preprint,arXiv:1906.0835, 2019.
|
[7] |
SONG C Z , RISTENPART T , SHMATIKOV V . Machine learning models that remember too much[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2017: 587-601.
|
[8] |
ZHANG T W . Privacy-preserving machine learning through data obfuscation[J]. arXiv Preprint,arXiv:1807.01860, 2018.
|
[9] |
BRAKERSKI Z , GENTRY C , VAIKUNTANATHAN V . (Leveled) fully homomorphic encryption without bootstrapping[J]. ACM Transactions on Computation Theory, 2014,6(3): 1-36.
|
[10] |
PAILLIER P , . Public-key cryptosystems based on composite degree residuosity classes[C]// Advances in Cryptology — EUROCRYPT’99. Berlin:Springer, 1999: 223-238.
|
[11] |
ABADI M , CHU A , GOODFELLOW I ,et al. Deep learning with differential privacy[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2016: 308-318.
|
[12] |
GOLATKAR A , ACHILLE A , SOATTO S . Eternal sunshine of the spotless net:selective forgetting in deep networks[C]// Proceedings of 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2020: 9304-9312.
|
[13] |
JIA J Y , SALEM A , BACKES M ,et al. MemGuard:defending against black-box membership inference attacks via adversarial examples[C]// Proceedings of 2019 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2019: 259-274.
|
[14] |
PAPERNOT N , ABADI M , ERLINGSSON U ,et al. Semi-supervised knowledge transfer for deep learning from private training data[J]. arXiv Preprint,arXiv:1610.05755, 2016.
|
[15] |
FREDRIKSON M , JHA S , RISTENPART T . Model inversion attacks that exploit confidence information and basic countermeasures[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2015: 1322-1333.
|
[16] |
HITAJ B , ATENIESE G , PEREZ-CRUZ F , . Deep models under the GAN:information leakage from collaborative deep learning[C]// Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2017: 603-618.
|
[17] |
PAN X D , ZHANG M , JI S L ,et al. Privacy risks of general-purpose language models[C]// Proceedings of 2020 IEEE Symposium on Security and Privacy (SP). Piscataway:IEEE Press, 2020: 1314-1331.
|
[18] |
SALEM A , BHATTACHARYA A , BACKES M ,et al. Updates-leak:data set inference and reconstruction attacks in online learning[C]// Proceedings of the 29th USENIX Security Symposium. Berkeley:USENIX Association, 2020: 1291-1308.
|
[19] |
WANG Z B , SONG M K , ZHANG Z F ,et al. Beyond inferring class representatives:user-level privacy leakage from federated learning[C]// Proceedings of IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2019: 2512-2520.
|
[20] |
杨攀, 桂小林, 姚婧 ,等. 支持同态算术运算的数据加密方案算法研究[J]. 通信学报, 2015,36(1): 171-182.
|
|
YANG P , GUI X L , YAO J ,et al. Research on algorithms of data en-cryption scheme that supports homomorphic arithmetical operations[J]. Journal on Communications, 2015,36(1): 171-182.
|
[21] |
闫玺玺, 原笑含, 汤永利 ,等. 基于区块链且支持验证的属性基搜索加密方案[J]. 通信学报, 2020,41(2): 187-198.
|
|
YAN X X , YUAN X H , TANG Y L ,et al. Verifiable attribute-based searchable encryption scheme based on blockchain[J]. Journal on Communications, 2020,41(2): 187-198.
|
[22] |
ZHANG Q C , YANG L T , CHEN Z K . Privacy preserving deep computation model on cloud for big data feature learning[J]. IEEE Transactions on Computers, 2016,65(5): 1351-1362.
|
[23] |
RAHULAMATHAVAN Y , PHAN R C W , VELURU S ,et al. Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud[J]. IEEE Transactions on Dependable and Secure Computing, 2014,11(5): 467-479.
|
[24] |
于东, 康海燕 . 面向时序数据发布的隐私保护方法研究[J]. 通信学报, 2015,36(S1): 243-249.
|
|
YU D , KANG H Y . Privacy protection method on time-series data publication[J]. Journal on Communications, 2015,36(S1): 243-249.
|
[25] |
韩培义, 刘川意, 王佳慧 ,等. 面向云存储的数据加密系统与技术研究[J]. 通信学报, 2020,41(8): 55-65.
|