Securing Deep Neural Networks on Edge from Membership Inference Attacks Using Trusted Execution Environments
Abstract
References
Index Terms
- Securing Deep Neural Networks on Edge from Membership Inference Attacks Using Trusted Execution Environments
Recommendations
Towards Trained Model Confidentiality and Integrity Using Trusted Execution Environments
Applied Cryptography and Network Security WorkshopsAbstractIn the security of machine learning, it is important to protect the confidentiality and integrity of trained models. The leakage of the data in a trained model leads to not only the infringement of intellectual property but also various attacks ...
Comparison of side-channel leakage on Rich and Trusted Execution Environments
CS2 '19: Proceedings of the Sixth Workshop on Cryptography and Security in Computing SystemsA Trusted Execution Environment (TEE) is a software solution made to improve security inside system on chip (SoC) based on ARM architecture. It offers a compromise between the functionality of the Rich Operating System (Rich OS), for example Android, ...
Membership reconstruction attack in deep neural networks
AbstractTo further enhance the reliability of Machine Learning (ML) systems, considerable efforts have been dedicated to developing privacy protection techniques. Recently, membership privacy has gained increasing attention, with a focus on ...
Comments
Information & Contributors
Information
Published In
- Chair:
- Pascal Meinerzhagen,
- Program Chair:
- Kapil Dev,
- Program Co-chair:
- Jerald Yoo
Sponsors
- SIGDA: ACM Special Interest Group on Design Automation
- IEEE CAS
- IEEE EDA
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 114Total Downloads
- Downloads (Last 12 months)114
- Downloads (Last 6 weeks)53
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in