Review Article

A Review of Deep Learning Security and Privacy Defensive Techniques

Table 3

Comparison of attacking and defensive techniques in Deep Learning.

Attack/defenseTechniqueTraining/testingTaxonomy

AttackAdversarial label flipsTrainingConfidentiality, integrity, and reliability
AttackEnchantingTrainingIntegrity and reliability
Exploratory attack
AttackObfuscationTrainingExploratory attack
Targeted attack
Integrity and reliability
AttackPoisoningTrainingConfidentiality, integrity, and reliability
Causative attack
Indiscriminate attack
AttackImpersonateTrainingExploratory attack
Integrity and reliability
DefenseAdversarial trainingTrainingCreates a fool-proof system, improves the safety and security of the system, and defeats security attacks
DefenseDefense distillationTrainingIt ensures the integrity, availability, reliability, and authenticity. Smooth classifier
DefenseEnsemble methodTrainingDetects anomalies in the network
Boosts data mining and intrusion detection
DefenseDifferential PrivacyTraining and testingIt protects the privacy of the data
DefenseHomomorphic EncryptionTraining and testingIt protects the privacy of the data to ensure confidentiality