Encrypted-SNN: A Privacy-Preserving Method for Converting Artificial Neural Networks to Spiking Neural Networks

被引:0
作者
Luo, Xiwen [1 ]
Fu, Qiang [1 ]
Qin, Sheng [1 ]
Wang, Kaiyang [2 ]
机构
[1] Guangxi Normal Univ, Sch Elect & Informat Engn, Guangxi Key Lab Brain inspired Comp & Intelligent, Guilin, Peoples R China
[2] Nanjing Audit Univ, Int Joint Audit Inst, Nanjing, Peoples R China
来源
NEURAL INFORMATION PROCESSING, ICONIP 2023, PT II | 2024年 / 14448卷
基金
中国国家自然科学基金;
关键词
Artificial Neural Networks; Spiking Neural Networks; ANN-SNN conversion; Privacy Protection;
D O I
10.1007/978-981-99-8082-6_40
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The transformation from Artificial Neural Networks (ANNs) to Spiking Neural Networks (SNNs) presents a formidable challenge, particularly in terms of preserving privacy to safeguard sensitive data during the conversion process. In response to these privacy concerns, a novel Encrypted-SNN approach is proposed for the ANN-SNN conversion. By incorporating noise into the gradients of both ANNs and SNNs, privacy protection without compromising network performance can be enhanced. The proposed method is tested using popular datasets including CIFAR10, MNIST, and Fashion MNIST, achieving respective accuracies of 88.1%, 99.3%, and 93.0% respectively. The influence of three distinct privacy budgets (is an element of = 0.5, 1.0, and 1.6) on the accuracy of the model are also discussed. Experimental results demonstrate that the Encrypted-SNN approach effectively optimizes the balance between privacy and performance. This has practical implications for data privacy protection and contributes to the enhancement of security and privacy within SNNs.
引用
收藏
页码:519 / 530
页数:12
相关论文
共 36 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Boski M, 2017, 2017 10TH INTERNATIONAL WORKSHOP ON MULTIDIMENSIONAL (ND) SYSTEMS (NDS)
[3]  
Cui Yuming, 2023, 2023 15th International Conference on Computer Research and Development (ICCRD), P21, DOI 10.1109/ICCRD56364.2023.10080444
[4]  
Deng M., 2022, ICONIP 2022 CCIS, V1793, P14, DOI [10.1007/978- 981- 99- 1645- 0_2, DOI 10.1007/978-981-99-1645-0_2]
[5]  
Diehl PU, 2015, IEEE IJCNN
[6]  
Dong JS, 2022, J ROY STAT SOC B, V84, P3, DOI 10.1111/rssb.12454
[7]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[8]   An ensemble unsupervised spiking neural network for objective recognition [J].
Fu, Qiang ;
Dong, Hongbin .
NEUROCOMPUTING, 2021, 419 :47-58
[9]  
Han B., 2020, P IEEECVF C COMPUTER
[10]   Spiking Deep Residual Networks [J].
Hu, Yangfan ;
Tang, Huajin ;
Pan, Gang .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2023, 34 (08) :5200-5205