Exploring Image Reconstruction Attack in Deep Learning Computation Offloading

作者: Hyunseok Oh , Youngki Lee

DOI: 10.1145/3325413.3329791

关键词:

摘要: Deep learning (DL) computation offloading is commonly adopted to enable the use of computation-intensive DL techniques on resource-constrained devices. However, sending private user data an external server raises a serious privacy concern. In this paper, we introduce privacy-invading input reconstruction method which utilizes intermediate pipeline. doing so, first define Peak Signal-to-Noise Ratio (PSNR)-based metric for assessing quality. Then, simulate attack diverse models find out relationship between model structures and performance attacks. Finally, provide several insights structure design prevent reconstruction-based attacks: using skip-connection, making deeper, including various operations such as inception module.

参考文章(25)
Karen Simonyan, Andrew Zisserman, Very Deep Convolutional Networks for Large-Scale Image Recognition computer vision and pattern recognition. ,(2014)
Hod Lipson, Jeff Clune, Thomas J. Fuchs, Jason Yosinski, Anh Mai Nguyen, Understanding Neural Networks Through Deep Visualization arXiv: Computer Vision and Pattern Recognition. ,(2015)
Matt Fredrikson, Somesh Jha, Thomas Ristenpart, Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures computer and communications security. pp. 1322- 1333 ,(2015) , 10.1145/2810103.2813677
Dong C. Liu, Jorge Nocedal, On the limited memory BFGS method for large scale optimization Mathematical Programming. ,vol. 45, pp. 503- 528 ,(1989) , 10.1007/BF01589116
Reza Shokri, Vitaly Shmatikov, Privacy-Preserving Deep Learning computer and communications security. pp. 1310- 1321 ,(2015) , 10.1145/2810103.2813687
Alain Hore, Djemel Ziou, Image Quality Metrics: PSNR vs. SSIM international conference on pattern recognition. pp. 2366- 2369 ,(2010) , 10.1109/ICPR.2010.579
Leonid I. Rudin, Stanley Osher, Emad Fatemi, Nonlinear total variation based noise removal algorithms Physica D: Nonlinear Phenomena. ,vol. 60, pp. 259- 268 ,(1992) , 10.1016/0167-2789(92)90242-F
Deyan Chen, Hong Zhao, Data Security and Privacy Protection Issues in Cloud Computing international conference on computer science and electronics engineering. ,vol. 1, pp. 647- 651 ,(2012) , 10.1109/ICCSEE.2012.193
Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, Li Fei-Fei, ImageNet: A large-scale hierarchical image database computer vision and pattern recognition. pp. 248- 255 ,(2009) , 10.1109/CVPR.2009.5206848
Ethan Rublee, Vincent Rabaud, Kurt Konolige, Gary Bradski, ORB: An efficient alternative to SIFT or SURF international conference on computer vision. pp. 2564- 2571 ,(2011) , 10.1109/ICCV.2011.6126544