Review Article

A Review of Deep Learning Security and Privacy Defensive Techniques

Table 2

Comparison of countermeasure techniques of Deep Learning.

Countermeasure methodsAdvantagesDisadvantages

Adversarial training [94]Very easy to understand and implementIt depends upon the sample size in the training phase
Scalable and have the ability to handle the complex dataset
Defense distillation [80]Sample and have the defense abilityDifficult to converge and high complexity
Ensemble method [95]Model-independent, good generalizationDo not rebut the training data and computation overhead
Differential Privacy [96]Preserves the privacy of training and learning dataIt also affects legitimate data and model-independent
Low overhead, low complexity
Homomorphic Encryption [97]Maintains security and privacy of data and simpleIt increases the data size and extensive computation overhead