{"id":"https://openalex.org/W3132875904","doi":"https://doi.org/10.1109/trustcom50675.2020.00089","title":"Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks","display_name":"Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks","publication_year":2020,"publication_date":"2020-12-01","ids":{"openalex":"https://openalex.org/W3132875904","doi":"https://doi.org/10.1109/trustcom50675.2020.00089","mag":"3132875904"},"language":"en","primary_location":{"id":"doi:10.1109/trustcom50675.2020.00089","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom50675.2020.00089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101859275","display_name":"De Li","orcid":"https://orcid.org/0009-0008-0202-4723"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"De Li","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China","School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China","Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100639418","display_name":"Jinyan Wang","orcid":"https://orcid.org/0000-0001-6641-9371"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinyan Wang","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China","Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China","School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031121873","display_name":"Tan Zhou","orcid":"https://orcid.org/0000-0002-0792-1676"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhou Tan","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China","School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China","Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037037839","display_name":"Xianxian Li","orcid":"https://orcid.org/0000-0002-7083-3847"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianxian Li","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China","School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China","Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101789926","display_name":"Yuhang Hu","orcid":"https://orcid.org/0000-0003-3348-6687"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuhang Hu","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China","School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China","Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101859275"],"corresponding_institution_ids":["https://openalex.org/I29739308"],"apc_list":null,"apc_paid":null,"fwci":0.7954,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.79335246,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"631","last_page":"638"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9664000272750854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.9343922138214111},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.786453127861023},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.690311849117279},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6855412721633911},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.605768084526062},{"id":"https://openalex.org/keywords/feed-forward","display_name":"Feed forward","score":0.5855994820594788},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5739496350288391},{"id":"https://openalex.org/keywords/backpropagation","display_name":"Backpropagation","score":0.4850284457206726},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.47141027450561523},{"id":"https://openalex.org/keywords/feedforward-neural-network","display_name":"Feedforward neural network","score":0.4694226384162903},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.465840220451355},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.4572673738002777},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.45558011531829834},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.450755774974823},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3539174199104309},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0879071056842804}],"concepts":[{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.9343922138214111},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.786453127861023},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.690311849117279},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6855412721633911},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.605768084526062},{"id":"https://openalex.org/C38858127","wikidata":"https://www.wikidata.org/wiki/Q5441228","display_name":"Feed forward","level":2,"score":0.5855994820594788},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5739496350288391},{"id":"https://openalex.org/C155032097","wikidata":"https://www.wikidata.org/wiki/Q798503","display_name":"Backpropagation","level":3,"score":0.4850284457206726},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.47141027450561523},{"id":"https://openalex.org/C47702885","wikidata":"https://www.wikidata.org/wiki/Q5441227","display_name":"Feedforward neural network","level":3,"score":0.4694226384162903},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.465840220451355},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4572673738002777},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45558011531829834},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.450755774974823},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3539174199104309},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0879071056842804},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.0},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom50675.2020.00089","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom50675.2020.00089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G316237905","display_name":null,"funder_award_id":"61763003,61672176,61941201","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1787224781","https://openalex.org/W1873763122","https://openalex.org/W1981029888","https://openalex.org/W1993116423","https://openalex.org/W2022686119","https://openalex.org/W2051267297","https://openalex.org/W2053637704","https://openalex.org/W2096633407","https://openalex.org/W2112380340","https://openalex.org/W2123820077","https://openalex.org/W2138865266","https://openalex.org/W2154851992","https://openalex.org/W2473418344","https://openalex.org/W2535690855","https://openalex.org/W2626769593","https://openalex.org/W2729742878","https://openalex.org/W2785054398","https://openalex.org/W2894843516","https://openalex.org/W2911915417","https://openalex.org/W2921836044","https://openalex.org/W2963313259","https://openalex.org/W2964935548","https://openalex.org/W2970178929","https://openalex.org/W2970677604","https://openalex.org/W3006463092","https://openalex.org/W3091383840","https://openalex.org/W3102407811","https://openalex.org/W3102970498","https://openalex.org/W3104097132","https://openalex.org/W6639246211","https://openalex.org/W6663928093","https://openalex.org/W6676639149"],"related_works":["https://openalex.org/W4309224979","https://openalex.org/W1604847762","https://openalex.org/W3156786002","https://openalex.org/W2597787948","https://openalex.org/W2086999410","https://openalex.org/W2763522098","https://openalex.org/W1824158299","https://openalex.org/W2002183807","https://openalex.org/W2063931099","https://openalex.org/W2593301408"],"abstract_inverted_index":{"Feedforward-designed":[0],"convolutional":[1],"neural":[2],"network":[3,26,52],"(FF-CNN)":[4],"is":[5,27,58,142,161],"an":[6,167],"interpretable":[7],"network.":[8],"The":[9,24],"parameter":[10],"training":[11,71,88,98,121,126,140,152,181],"of":[12,41,76,97,118,128,139,149,190,208],"the":[13,30,35,39,42,51,55,61,69,74,86,95,111,115,119,125,131,136,147,150,154,180,187,191,195,200,206,209,218],"model":[14,91,192],"does":[15],"not":[16,162],"require":[17],"backpropagation":[18],"(BP)":[19],"and":[20,38,81,108,130,211,224,232],"optimization":[21],"algorithms":[22],"(SGD).":[23],"entire":[25],"based":[28],"on":[29,229],"statistical":[31],"data":[32,99,122,141,182],"output":[33,133,196],"by":[34],"previous":[36],"layer,":[37],"parameters":[40,127],"current":[43],"layer":[44],"are":[45],"obtained":[46],"through":[47],"one-pass":[48],"manner.":[49],"Since":[50],"complexity":[53],"under":[54],"FF":[56],"design":[57,199],"lower":[59],"than":[60,68,242],"BP":[62,70],"algorithm,":[63],"FF-CNN":[64,87,129,151],"has":[65,239],"better":[66,240],"utility":[67,241],"method":[72],"in":[73,183],"directions":[75],"semi-supervised":[77],"learning,":[78,80],"ensemble":[79],"continuous":[82],"subspace":[83,172],"learning.":[84],"However,":[85,144],"process":[89],"or":[90],"release":[92],"will":[93],"cause":[94],"privacy":[96,137,158,171,201,215,244],"to":[100,146,178,186,194,205,217],"be":[101],"leaked.":[102],"In":[103],"this":[104],"paper,":[105],"we":[106,165,198],"analyze":[107],"verify":[109],"that":[110,236],"attacker":[112],"can":[113],"obtain":[114],"private":[116],"information":[117],"original":[120],"after":[123],"mastering":[124],"partial":[132],"responses.":[134],"Therefore,":[135],"protection":[138,159,245],"imperative.":[143],"due":[145],"particularity":[148],"method,":[153],"existing":[155,243],"deep":[156],"learning":[157],"technology":[160],"applicable.":[163],"So":[164],"proposed":[166],"algorithm":[168,238],"called":[169],"differential":[170],"approximation":[173],"with":[174,220],"adjusted":[175],"bias":[176],"(DPSaab)":[177],"protect":[179],"FF-CNN.":[184],"According":[185],"different":[188],"contribution":[189],"filters":[193],"response,":[197],"budget":[202,216],"allocation":[203],"according":[204],"ratio":[207],"eigenvalues":[210],"allocate":[212],"a":[213,221],"larger":[214],"filter":[219],"large":[222],"contribution,":[223],"vice":[225],"versa.":[226],"Extensive":[227],"experiments":[228],"MNIST,":[230],"Fashion-MNIST,":[231],"CIFAR-10":[233],"datasets":[234],"show":[235],"DPSaab":[237],"technologies.":[246]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
