Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode
The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model training stage.Aiming at the attack in the data pr...
Saved in:
Main Authors: | Hezhong PAN, Peiyi HAN, Xiayu XIANG, Shaoming DUAN, Rongfei ZHUANG, Chuanyi LIU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2021-11-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021215/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Metaverse Kapsamında Oyun-içi Reklam Uygulamaları: Sandbox Alpha 2 Örneği
by: Ece Doğan Erdinç, et al.
Published: (2022-12-01) -
Research on data encryption system and technology for cloud storage
by: Peiyi HAN, et al.
Published: (2020-08-01) -
Current Situation of Illegal Usage of Special Expertise while Investigating Thefts
by: O. V. Haidar
Published: (2021-09-01) -
Generate medical synthetic data based on generative adversarial network
by: Xiayu XIANG, et al.
Published: (2022-03-01) -
Electricity theft detection in integrated energy systems considering multi-energy loads
by: Wenlong Liao, et al.
Published: (2025-03-01)