{"id":"https://openalex.org/W3013870609","doi":"https://doi.org/10.1109/ickii46306.2019.9042653","title":"Preserving Privacy in Convolutional Neural Network: An \u220a-tuple Differential Privacy Approach","display_name":"Preserving Privacy in Convolutional Neural Network: An \u220a-tuple Differential Privacy Approach","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W3013870609","doi":"https://doi.org/10.1109/ickii46306.2019.9042653","mag":"3013870609"},"language":"en","primary_location":{"id":"doi:10.1109/ickii46306.2019.9042653","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ickii46306.2019.9042653","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 2nd International Conference on Knowledge Innovation and Invention (ICKII)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075908302","display_name":"Tosin A. Adesuyi","orcid":null},"institutions":[{"id":"https://openalex.org/I113409471","display_name":"Kumoh National Institute of Technology","ror":"https://ror.org/05dkjfz60","country_code":"KR","type":"education","lineage":["https://openalex.org/I113409471"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Tosin A. Adesuyi","raw_affiliation_strings":["Department of Software Engineering, Kumoh National Institute of Technology, Gumi, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Kumoh National Institute of Technology, Gumi, South Korea","institution_ids":["https://openalex.org/I113409471"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074346926","display_name":"Byeong Man Kim","orcid":"https://orcid.org/0000-0003-4456-9314"},"institutions":[{"id":"https://openalex.org/I113409471","display_name":"Kumoh National Institute of Technology","ror":"https://ror.org/05dkjfz60","country_code":"KR","type":"education","lineage":["https://openalex.org/I113409471"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Byeong Man Kim","raw_affiliation_strings":["Department of Software Engineering, Kumoh National Institute of Technology, Gumi, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Kumoh National Institute of Technology, Gumi, South Korea","institution_ids":["https://openalex.org/I113409471"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075908302"],"corresponding_institution_ids":["https://openalex.org/I113409471"],"apc_list":null,"apc_paid":null,"fwci":0.1445,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.6212913,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"570","last_page":"573"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.77680504322052},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7300431728363037},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7113921642303467},{"id":"https://openalex.org/keywords/tuple","display_name":"Tuple","score":0.6761239171028137},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5797199010848999},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5053613781929016},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4948508143424988},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.47044721245765686},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4473136365413666},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.42434629797935486},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4153404235839844},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38869598507881165},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24965426325798035},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07576638460159302}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.77680504322052},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7300431728363037},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7113921642303467},{"id":"https://openalex.org/C118930307","wikidata":"https://www.wikidata.org/wiki/Q600590","display_name":"Tuple","level":2,"score":0.6761239171028137},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5797199010848999},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5053613781929016},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4948508143424988},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.47044721245765686},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4473136365413666},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42434629797935486},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4153404235839844},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38869598507881165},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24965426325798035},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07576638460159302},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ickii46306.2019.9042653","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ickii46306.2019.9042653","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 2nd International Conference on Knowledge Innovation and Invention (ICKII)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2051267297","https://openalex.org/W2109135024","https://openalex.org/W2109426455","https://openalex.org/W2115358662","https://openalex.org/W2136922672","https://openalex.org/W2248469562","https://openalex.org/W2498056627","https://openalex.org/W2791931128","https://openalex.org/W2922690119","https://openalex.org/W2962949934","https://openalex.org/W3137695714","https://openalex.org/W6758947373","https://openalex.org/W6763485134"],"related_works":["https://openalex.org/W3038283795","https://openalex.org/W2604501336","https://openalex.org/W2734500670","https://openalex.org/W2558166297","https://openalex.org/W2315671126","https://openalex.org/W798507144","https://openalex.org/W2964481303","https://openalex.org/W4245395944","https://openalex.org/W1751413323","https://openalex.org/W2143551613"],"abstract_inverted_index":{"Recent":[0],"breakthrough":[1],"in":[2,24],"neural":[3,12,127],"network":[4,13,128],"has":[5,16,140,173],"led":[6],"to":[7,19,36,45,80,104,200],"the":[8,25,37,98,110,113,219],"birth":[9],"of":[10,27,39,112,125,132,203],"Convolutional":[11],"(CNN)":[14],"which":[15,52],"been":[17],"found":[18],"be":[20],"very":[21],"efficient":[22],"especially":[23,145],"areas":[26],"image":[28],"recognition":[29],"and":[30,42,48,171,218],"classification.":[31],"This":[32,117],"success":[33],"is":[34,118,193],"traceable":[35],"availability":[38],"large":[40,216],"datasets":[41,217],"its":[43,133],"capability":[44],"learn":[46],"salient":[47],"complex":[49],"data":[50,83,135,151],"features":[51],"subsequently":[53],"produce":[54],"a":[55,93,123,142,147,179],"reusable":[56],"output":[57],"model":[58,94,99,114,155,177,205],"(F":[59],"<sub":[60,66,101],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[61,67,102],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">\u03b8</sub>":[62,68,103],").":[63],"The":[64],"F":[65,100],"are":[69,152],"often":[70],"made":[71],"available":[72],"(e.g.":[73],"on":[74,97,178,195,214],"cloud":[75],"as-a-service)":[76],"for":[77],"others":[78],"(client)":[79],"train":[81],"their":[82],"or":[84,149],"do":[85],"transfer":[86],"learning,":[87],"however,":[88],"an":[89,187],"adversary":[90],"can":[91],"perpetrate":[92],"inversion":[95],"attack":[96],"recover":[105],"training":[106,134],"data,":[107],"hence":[108],"compromising":[109],"sensitivity":[111],"buildup":[115,156],"data.":[116,157],"possible":[119],"because":[120],"CNN":[121,204],"as":[122,154],"variant":[124],"deep":[126],"does":[129],"memorize":[130],"most":[131],"during":[136],"learning.":[137],"Consequently,":[138],"this":[139,172,183],"pose":[141],"privacy":[143,162,175,190,202],"concern":[144],"when":[146],"medical":[148],"financial":[150],"used":[153],"Existing":[158],"researches":[159],"that":[160,192],"proffers":[161],"preserving":[163,176],"approach":[164,191,213],"however":[165],"suffer":[166],"from":[167],"significant":[168,207,223],"accuracy":[169,208,224],"degradation":[170],"left":[174],"theoretical":[180],"desk.":[181],"In":[182],"paper,":[184],"we":[185],"proposed":[186],"\u03f5-tuple":[188],"differential":[189],"based":[194],"neuron":[196],"impact":[197],"factor":[198],"estimation":[199],"preserve":[201],"without":[206],"degradation.":[209,225],"We":[210],"experiment":[211],"our":[212],"two":[215],"result":[220],"shows":[221],"no":[222]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
