𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Privacy-Preserving Machine Learning (SpringerBriefs on Cyber Security Systems and Networks)

✍ Scribed by Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li


Publisher
Springer
Year
2022
Tongue
English
Leaves
95
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.

✦ Table of Contents


Preface
Contents
1 Introduction
1.1 What Is Machine Learning?
1.2 Why Machine Learning Needs Privacy-Preserving Manner
1.3 Security Threats
1.4 Bibliographic Notes
References
2 Secure Cooperative Learning in Early Years
2.1 An Overview of Neural Network
2.2 Back-Propagation Learning
2.3 Vertically Partitioned Training Dataset
2.3.1 Privacy-Preserving Two-Party Training
2.3.2 Secure Manner
2.3.3 Scheme Details
2.3.4 Analysis of Security and Accuracy Loss
2.4 Arbitrarily Partitioned Training Dataset
2.4.1 BGN Homomorphic Encryption
2.4.2 Overviews
2.4.3 Scheme Details
References
3 Outsourced Computation for Learning
3.1 Outsourced Computation
3.2 Multi-key Privacy-Preserving Deep Learning
3.2.1 Deep Learning
3.2.2 Homomorphic Encryption with Double Decryption Mechanism
3.2.3 Basic Scheme
3.2.4 Advance Scheme
3.2.5 Security Analysis
References
4 Secure Distributed Learning
4.1 Distributed Privacy-Preserving Deep Learning
4.1.1 Distributed Selective SGD
4.1.2 Scheme Details
4.2 Secure Aggregation for Deep Learning
4.2.1 Secure Manner
4.2.2 Technical Intuition
4.2.3 Secure Protocol
References
5 Learning with Differential Privacy
5.1 Differential Privacy
5.1.1 Definition
5.1.2 Privacy Mechanism
5.2 Deep Learning with Differential Privacy
5.2.1 Differentially Private SGD Algorithm
5.2.2 Privacy Account
5.3 Distributed Deep Learning with Differential Privacy
5.3.1 Private Algorithm
5.3.2 Estimating Sensitivity
References
6 Applicationsβ€”Privacy-Preserving Image Processing
6.1 Machine Learning Image Processing for Privacy Protection
6.2 Feature Extraction Methods of Machine Learning Image Processing
6.3 Main Models of Machine Learning Image Processing for Privacy Protection
6.3.1 Privacy-Preserving Face Recognition
6.3.2 Privacy-Preserving Object Recognition
6.3.3 Privacy-Preserving Classification
Reference
7 Threats in Open Environment
7.1 Data Reconstruction Attack
7.1.1 Threat Model
7.1.2 Attack Method
7.2 Membership Inference Attack
7.2.1 Threat Model
7.2.2 Attack Method
7.3 Model Stealing Attack
7.3.1 Threat Model
7.3.2 Attack Method
References
8 Conclusion


πŸ“œ SIMILAR VOLUMES


Privacy-Preserving Deep Learning: A Comp
✍ Kwangjo Kim, Harry Chandra Tanuwidjaja πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>This book discusses the state-of-the-art in privacy-preserving deep learning (PPDL), especially as a tool for machine learning as a service (MLaaS), which serves as an enabling technology by combining classical privacy-preserving and cryptographic protocols with deep learning. Google and Micro

Machine Learning in Cyber Trust: Securit
✍ Lui Sha, Sathish Gopalakrishnan, Xue Liu, Qixin Wang (auth.), Philip S. Yu, Jeff πŸ“‚ Library πŸ“… 2009 πŸ› Springer US 🌐 English

<p><P>Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning

Social Network Forensics, Cyber Security
✍ P. Venkata Krishna, Sasikumar Gurumoorthy, Mohammad S. Obaidat πŸ“‚ Library πŸ“… 2019 πŸ› Springer Singapore 🌐 English

<p><p>This book discusses the issues and challenges in Online Social Networks (OSNs). It highlights various aspects of OSNs consisting of novel social network strategies and the development of services using different computing models. Moreover, the book investigates how OSNs are impacted by cutting

International Conference on Cyber Securi
✍ Nadia Nedjah, Gregorio MartΓ­nez PΓ©rez, B. B. Gupta πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<span>This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2022),Β  organized during September 09–11, 2022, in Thailand in online mode. The objective of ICSPN 2022 is to provide a premier international platfo