When machine learning meets privacy: A survey and outlook

B Liu, M Ding, S Shaham, W Rahayu… - ACM Computing …, 2021 - dl.acm.org
The newly emerged machine learning (eg, deep learning) methods have become a strong
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …

Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions

I Gupta, AK Singh, CN Lee, R Buyya - IEEE Access, 2022 - ieeexplore.ieee.org
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …

Cheetah: Lean and fast secure {Two-Party} deep neural network inference

Z Huang, W Lu, C Hong, J Ding - 31st USENIX Security Symposium …, 2022 - usenix.org
Secure two-party neural network inference (2PC-NN) can offer privacy protection for both the
client and the server and is a promising technique in the machine-learning-as-a-service …

Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

RETRACTED: SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising

P Manoharan, R Walia, C Iwendi, TA Ahanger… - Expert …, 2023 - Wiley Online Library
Abstract Machine learning are vulnerable to the threats. The Intruders can utilize the
malicious nature of the nodes to attack the training dataset to worsen the process and …

A survey on cyber-security of connected and autonomous vehicles (CAVs)

X Sun, FR Yu, P Zhang - IEEE Transactions on Intelligent …, 2021 - ieeexplore.ieee.org
As the general development trend of the automotive industry, connected and autonomous
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …

Toward trustworthy AI development: mechanisms for supporting verifiable claims

M Brundage, S Avin, J Wang, H Belfield… - arxiv preprint arxiv …, 2020 - arxiv.org
With the recent wave of progress in artificial intelligence (AI) has come a growing awareness
of the large-scale impacts of AI systems, and recognition that existing regulations and norms …

PoisonGAN: Generative poisoning attacks against federated learning in edge computing systems

J Zhang, B Chen, X Cheng, HTT Binh… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Edge computing is a key-enabling technology that meets continuously increasing
requirements for the intelligent Internet-of-Things (IoT) applications. To cope with the …

{XONN}:{XNOR-based} oblivious deep neural network inference

MS Riazi, M Samragh, H Chen, K Laine… - 28th USENIX Security …, 2019 - usenix.org
Advancements in deep learning enable cloud servers to provide inference-as-a-service for
clients. In this scenario, clients send their raw data to the server to run the deep learning …

POSEIDON: Privacy-preserving federated neural network learning

S Sav, A Pyrgelis, JR Troncoso-Pastoriza… - arxiv preprint arxiv …, 2020 - arxiv.org
In this paper, we address the problem of privacy-preserving training and evaluation of neural
networks in an $ N $-party, federated learning setting. We propose a novel system …