Encrypted-SNN: A Privacy-Preserving Method for Converting Artificial Neural Networks to Spiking Neural Networks

被引:0
作者
Luo, Xiwen [1 ]
Fu, Qiang [1 ]
Qin, Sheng [1 ]
Wang, Kaiyang [2 ]
机构
[1] Guangxi Normal Univ, Sch Elect & Informat Engn, Guangxi Key Lab Brain inspired Comp & Intelligent, Guilin, Peoples R China
[2] Nanjing Audit Univ, Int Joint Audit Inst, Nanjing, Peoples R China
来源
NEURAL INFORMATION PROCESSING, ICONIP 2023, PT II | 2024年 / 14448卷
基金
中国国家自然科学基金;
关键词
Artificial Neural Networks; Spiking Neural Networks; ANN-SNN conversion; Privacy Protection;
D O I
10.1007/978-981-99-8082-6_40
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The transformation from Artificial Neural Networks (ANNs) to Spiking Neural Networks (SNNs) presents a formidable challenge, particularly in terms of preserving privacy to safeguard sensitive data during the conversion process. In response to these privacy concerns, a novel Encrypted-SNN approach is proposed for the ANN-SNN conversion. By incorporating noise into the gradients of both ANNs and SNNs, privacy protection without compromising network performance can be enhanced. The proposed method is tested using popular datasets including CIFAR10, MNIST, and Fashion MNIST, achieving respective accuracies of 88.1%, 99.3%, and 93.0% respectively. The influence of three distinct privacy budgets (is an element of = 0.5, 1.0, and 1.6) on the accuracy of the model are also discussed. Experimental results demonstrate that the Encrypted-SNN approach effectively optimizes the balance between privacy and performance. This has practical implications for data privacy protection and contributes to the enhancement of security and privacy within SNNs.
引用
收藏
页码:519 / 530
页数:12
相关论文
共 36 条
[11]  
Kim S, 2020, AAAI CONF ARTIF INTE, V34, P11270
[12]  
Kim Y, 2022, AAAI CONF ARTIF INTE, P1192
[13]  
Krizhevsky A, 2009, Technical Report
[14]   Gradient-based learning applied to document recognition [J].
Lecun, Y ;
Bottou, L ;
Bengio, Y ;
Haffner, P .
PROCEEDINGS OF THE IEEE, 1998, 86 (11) :2278-2324
[15]   Enabling Spike-Based Backpropagation for Training Deep Neural Network Architectures [J].
Lee, Chankyu ;
Sarwar, Syed Shakib ;
Panda, Priyadarshini ;
Srinivasan, Gopalakrishnan ;
Roy, Kaushik .
FRONTIERS IN NEUROSCIENCE, 2020, 14
[16]   Training Deep Spiking Neural Networks Using Backpropagation [J].
Lee, Jun Haeng ;
Delbruck, Tobi ;
Pfeiffer, Michael .
FRONTIERS IN NEUROSCIENCE, 2016, 10
[17]  
Li YH, 2021, INT C MACHINE LEARNI, V139
[18]  
Li YH, 2022, Arxiv, DOI arXiv:2205.10121
[19]   Intelligent Traffic Light Control by Exploring Strategies in an Optimised Space of Deep Q-Learning [J].
Liu, Junxiu ;
Qin, Sheng ;
Luo, Yuling ;
Wang, Yanhu ;
Yang, Su .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (06) :5960-5970
[20]   Machine Learning-Based Similarity Attacks for Chaos-Based Cryptosystems [J].
Liu, Junxiu ;
Zhang, Shunsheng ;
Luo, Yuling ;
Cao, Lvchen .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) :824-837