<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
handle: 10044/1/57311
We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints. Using the selective exchange of information between a user's device and a service provider, DPFE enables the user to prevent certain sensitive information from being shared with a service provider, while allowing them to extract approved information using their model. We introduce and utilize the log-rank privacy, a novel measure to assess the effectiveness of DPFE in removing sensitive information and compare different models based on their accuracy-privacy tradeoff. We then implement and evaluate the performance of DPFE on smartphones to understand its complexity, resource demands, and efficiency tradeoffs. Our results on benchmark image datasets demonstrate that under moderate resource utilization, DPFE can achieve high accuracy for primary tasks while preserving the privacy of sensitive features.
FOS: Computer and information sciences, Technology, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Computer Science - Information Theory, Computer Vision and Pattern Recognition (cs.CV), cs.LG, Computer Science - Computer Vision and Pattern Recognition, Machine Learning (stat.ML), privacy, Computer Science, Artificial Intelligence, Machine Learning (cs.LG), cs.CR, Engineering, Artificial Intelligence, Statistics - Machine Learning, cs.IT, Training, math.IT, cs.CV, information theory, 020, Science & Technology, Computer Science, Information Systems, Information Theory (cs.IT), Data models, deep learning, Engineering, Electrical & Electronic, stat.ML, 004, Privacy, Computer Science, Task analysis, Electrical & Electronic, Feature extraction, 08 Information and Computing Sciences, Data privacy, Cryptography and Security (cs.CR), Information Systems
FOS: Computer and information sciences, Technology, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Computer Science - Information Theory, Computer Vision and Pattern Recognition (cs.CV), cs.LG, Computer Science - Computer Vision and Pattern Recognition, Machine Learning (stat.ML), privacy, Computer Science, Artificial Intelligence, Machine Learning (cs.LG), cs.CR, Engineering, Artificial Intelligence, Statistics - Machine Learning, cs.IT, Training, math.IT, cs.CV, information theory, 020, Science & Technology, Computer Science, Information Systems, Information Theory (cs.IT), Data models, deep learning, Engineering, Electrical & Electronic, stat.ML, 004, Privacy, Computer Science, Task analysis, Electrical & Electronic, Feature extraction, 08 Information and Computing Sciences, Data privacy, Cryptography and Security (cs.CR), Information Systems
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 55 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 1% | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 1% |