{"title":"A review of Deep Learning Privacy, Security and Defenses","authors":"A. Dawood, Noor Kadhim Hadi","doi":"10.47577/technium.v12i.9471","DOIUrl":null,"url":null,"abstract":"Deep learning (DL) can be considered as a powerful tool in different fields and for different applications but its importance raised the concern about privacy, security, and defense issues. This research presents an important overview about different aspects and state-of-the-art techniques in DL privacy, security, and defense. Wide range of topics was covered including private data frameworks, different types of threats and attacks, and the most important defense techniques. We have also discussed the challenges and limitations of each approach besides to possible future research directions. This survey can be considered as a comprehensive guide for other researchers and policymakers who are interested in understanding these important topics associated with DL.","PeriodicalId":388226,"journal":{"name":"Technium: Romanian Journal of Applied Sciences and Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Technium: Romanian Journal of Applied Sciences and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47577/technium.v12i.9471","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Deep learning (DL) can be considered as a powerful tool in different fields and for different applications but its importance raised the concern about privacy, security, and defense issues. This research presents an important overview about different aspects and state-of-the-art techniques in DL privacy, security, and defense. Wide range of topics was covered including private data frameworks, different types of threats and attacks, and the most important defense techniques. We have also discussed the challenges and limitations of each approach besides to possible future research directions. This survey can be considered as a comprehensive guide for other researchers and policymakers who are interested in understanding these important topics associated with DL.