A Comprehensive Analysis of Information Leakage in Deep Transfer Learning

09/04/2020
by   Cen Chen, et al.
0

Transfer learning is widely used for transferring knowledge from a source domain to the target domain where the labeled data is scarce. Recently, deep transfer learning has achieved remarkable progress in various applications. However, the source and target datasets usually belong to two different organizations in many real-world scenarios, potential privacy issues in deep transfer learning are posed. In this study, to thoroughly analyze the potential privacy leakage in deep transfer learning, we first divide previous methods into three categories. Based on that, we demonstrate specific threats that lead to unintentional privacy leakage in each category. Additionally, we also provide some solutions to prevent these threats. To the best of our knowledge, our study is the first to provide a thorough analysis of the information leakage issues in deep transfer learning methods and provide potential solutions to the issue. Extensive experiments on two public datasets and an industry dataset are conducted to show the privacy leakage under different deep transfer learning settings and defense solution effectiveness.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/16/2020

PrivNet: Safeguarding Private Attributes in Transfer Learning for Recommendation

Transfer learning is an effective technique to improve a target recommen...
research
05/18/2020

VerifyTL: Secure and Verifiable Collaborative Transfer Learning

Getting access to labelled datasets in certain sensitive application dom...
research
09/24/2020

Privacy-preserving Transfer Learning via Secure Maximum Mean Discrepancy

The success of machine learning algorithms often relies on a large amoun...
research
11/15/2016

Intrinsic Geometric Information Transfer Learning on Multiple Graph-Structured Datasets

Graphs provide a powerful means for representing complex interactions be...
research
05/11/2017

Transfer Learning for Cross-Dataset Recognition: A Survey

This paper summarises and analyses the cross-dataset recognition transfe...

Please sign up or login with your details

Forgot password? Click here to reset