Privacy-preserving image classification using an isotropic network

MM AprilPyone, H Kiya - IEEE MultiMedia, 2022 - ieeexplore.ieee.org
In this article, we propose a privacy-preserving image classification method that uses
encrypted images and an isotropic network, such as the vision transformer. The proposed …

MocoSFL: enabling cross-client collaborative self-supervised learning

J Li, L Lyu, D Iso, C Chakrabarti… - … Conference on Learning …, 2022 - openreview.net
Existing collaborative self-supervised learning (SSL) schemes are not suitable for cross-
client applications because of their expensive computation and large local data …

Bounding the invertibility of privacy-preserving instance encoding using fisher information

K Maeng, C Guo, S Kariyappa… - Advances in Neural …, 2024 - proceedings.neurips.cc
Privacy-preserving instance encoding aims to encode raw data into feature vectors without
revealing their privacy-sensitive information. When designed properly, these encodings can …

Formal Privacy Proof of Data Encoding: The Possibility and Impossibility of Learnable Encryption

H **ao, GE Suh, S Devadas - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
We initiate a formal study on the concept of learnable obfuscation and aim to answer the
following question: is there a type of data encoding that maintains the" learnability" of …

Learnable Cube-based Video Encryption for Privacy-Preserving Action Recognition

Y Ishikawa, M Kondo… - Proceedings of the IEEE …, 2024 - openaccess.thecvf.com
With the development of cloud services and machine learning, there has been an inevitable
need to enhance privacy and security when serving video recognition models. Although …

Neuracrypt is not private

N Carlini, S Garg, S Jha, S Mahloujifar… - arxiv preprint arxiv …, 2021 - arxiv.org
NeuraCrypt (Yara et al. arxiv 2021) is an algorithm that converts a sensitive dataset to an
encoded dataset so that (1) it is still possible to train machine learning models on the …

Squint hard enough: Attacking perceptual hashing with adversarial machine learning

J Prokos, N Fendley, M Green, R Schuster… - 32nd USENIX Security …, 2023 - usenix.org
Many online communications systems use perceptual hash matching systems to detect illicit
files in user content. These systems employ specialized perceptual hash functions such as …

Privacy preservation in healthcare systems

BR Louassef, N Chikouche - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
With the progression in sensor technology and the low-cost electronic circuits' proliferation,
the Internet of Things (IoT) is emerging as a promising technology for enhancing people life …

Learnable Image Transformations for Privacy Enhanced Deep Neural Networks

D Rodriguez, R Krishnan - … on Trust, Privacy and Security in …, 2023 - ieeexplore.ieee.org
A large number of data are uploaded to cloud-based machine learning service providers. A
major concern is that such data often contain a lot more sensitive information than the …