Morphed Learning: Towards Privacy-Preserving for Deep Learning Based Applications

09/20/2018
by   Juncheng Shen, et al.
0

The concern of potential privacy violation has prevented efficient use of big data for improving deep learning based applications. In this paper, we propose Morphed Learning, a privacy-preserving technique for deep learning based on data morphing that, allows data owners to share their data without leaking sensitive privacy information. Morphed Learning allows the data owners to send securely morphed data and provides the server with an Augmented Convolutional layer to train the network on morphed data without performance loss. Morphed Learning has these three features: (1) Strong protection against reverse-engineering on the morphed data; (2) Acceptable computational and data transmission overhead with no correlation to the depth of the neural network; (3) No degradation of the neural network performance. Theoretical analyses on CIFAR-10 dataset and VGG-16 network show that our method is capable of providing 10^89 morphing possibilities with only 5 10 analyses also proved that our method can offer same resilience against full knowledge attack if more resources are provided.

READ FULL TEXT

page 3

page 6

research
09/17/2019

Towards Efficient and Secure Delivery of Data for Deep Learning with Privacy-Preserving

Privacy recently emerges as a severe concern in deep learning, that is, ...
research
03/10/2021

NegDL: Privacy-Preserving Deep Learning Based on Negative Database

In the era of big data, deep learning has become an increasingly popular...
research
11/13/2018

How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?

Deep Learning algorithms have recently become the de-facto paradigm for ...
research
12/07/2022

A Systematic Literature Review On Privacy Of Deep Learning Systems

The last decade has seen a rise of Deep Learning with its applications r...
research
12/22/2020

Modeling Deep Learning Based Privacy Attacks on Physical Mail

Mail privacy protection aims to prevent unauthorized access to hidden co...
research
08/01/2022

Dyadic Movement Synchrony Estimation Under Privacy-preserving Conditions

Movement synchrony refers to the dynamic temporal connection between the...
research
05/09/2021

Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors

As autonomous driving and augmented reality evolve, a practical concern ...

Please sign up or login with your details

Forgot password? Click here to reset