What is it about?

The newly emerged machine learning (e.g., deep learning) methods have become a strong driving force to revolutionize a wide range of industries, such as smart healthcare, financial technology, and surveillance systems. Meanwhile, privacy has emerged as a big concern in this machine learning-based artificial intelligence era. This article is a comprehensive study on privacy preservation problems and machine learning. The survey covers three categories of interactions between privacy and machine learning: (i) private machine learning, (ii) machine learning-aided privacy protection, and (iii) machine learning-based privacy attack and corresponding protection schemes. The current research progress in each category is reviewed and the key challenges are identified. Finally, based on our in-depth analysis of the area of privacy and machine learning, we point out future research directions in this field.

Featured Image

Why is it important?

Privacy has emerged as a big concern in this machine/deep learning-based artificial intelligence era. It is important to note that the problem of privacy preservation in the context of machine learning is quite different from that in traditional data privacy protection, as machine learning can act as both friend and foe. Currently, the work on the preservation of privacy and machine learning is still in an infancy stage, as most existing solutions only focus on privacy problems during the machine learning process. Therefore, such a comprehensive study on the privacy preservation problems and machine learning is of high importance.

Perspectives

It has been a long but pleasant journey to write this article. I started the work on it when I was first attracted by privacy concerns in AI. And I still find it interesting every time I go back and read it through. Hope you find some insights as well.

Bo Liu
University of Technology Sydney

Read the Original

This page is a summary of: When Machine Learning Meets Privacy, ACM Computing Surveys, March 2022, ACM (Association for Computing Machinery),
DOI: 10.1145/3436755.
You can read the full text:

Read

Contributors

The following have contributed to this page