When Machine Learning Meets Privacy in 6G: A Survey

被引:116
作者
Sun, Yuanyuan [1 ]
Liu, Jiajia [2 ]
Wang, Jiadai [1 ]
Cao, Yurui [1 ]
Kato, Nei [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Northwestern Polytech Univ, Natl Engn Lab Integrated Aero Space Ground Ocean, Sch Cybersecur, Xian 710072, Peoples R China
[3] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 9808579, Japan
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2020年 / 22卷 / 04期
基金
中国国家自然科学基金;
关键词
Privacy; Data privacy; Big Data; MIMO communication; Tutorials; Machine learning; machine learning; 6G; violation; protection; communication; double-edged sword; SUPPORT VECTOR MACHINE; INTERNET-OF-THINGS; TRAFFIC CLASSIFICATION; HETEROGENEOUS INTERNET; VEHICLES CHALLENGES; INTRUSION DETECTION; ENCRYPTED DATA; MOBILE; EDGE; SECURITY;
D O I
10.1109/COMST.2020.3011561
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid-developing Artificial Intelligence (AI) technology, fast-growing network traffic, and emerging intelligent applications (e.g., autonomous driving, virtual reality, etc.) urgently require a new, faster, more reliable and flexible network form. At this time, researchers in both industry and academia have turned their attention to the sixth generation (6G) communication networks. In the 6G vision, various intelligent application scenarios that utilize Machine Learning (ML) technology (the most important branch of AI) will bring rich heterogeneous connections, as well as massive information storage and operations. When ML meets 6G, new opportunities will emerge along with numerous privacy challenges. On one hand, a secure ML structure, or the correct application of ML, can protect privacy in 6G. On the other hand, ML may be attacked or abused, resulting in privacy violation. It is worth noting that the alliance between 6G and ML may also be a double-edged sword in many cases, rather than absolutely infringe or protect privacy. Therefore, based on lots of existing meaningful works, this paper aims to provide a comprehensive survey of ML and privacy in 6G, with a view to further promoting the development of 6G and privacy protection technologies.
引用
收藏
页码:2694 / 2724
页数:31
相关论文
共 201 条
  • [21] Chen PY, 2018, AAAI CONF ARTIF INTE, P10
  • [22] Multi-Gait Recognition Based on Attribute Discovery
    Chen, Xin
    Weng, Jian
    Lu, Wei
    Xu, Jiaming
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2018, 40 (07) : 1697 - 1710
  • [23] Chen XH, 2018, IEEE INT CONF BIG DA, P1178, DOI 10.1109/BigData.2018.8622598
  • [24] Impact of maternal hypertensive disorders on offspring's neurodevelopment: a longitudinal prospective cohort study in China
    Chen, Zhong
    Li, Ruizhen
    Liu, Hua
    Duan, Junyu
    Yao, Cong
    Yang, Rong
    Zhang, Yaqi
    Qiu, Lin
    Xiong, Chao
    Zhou, Jieqiong
    Zhang, Bin
    [J]. PEDIATRIC RESEARCH, 2020, 88 (04) : 668 - 675
  • [25] Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption
    Cheon, Jung Hee
    Kim, Duhyeong
    Kim, Yongdai
    Song, Yongsoo
    [J]. IEEE ACCESS, 2018, 6 : 46938 - 46948
  • [26] Exploiting machine learning techniques for location recognition and prediction with smartphone logs
    Cho, Sung-Bae
    [J]. NEUROCOMPUTING, 2016, 176 : 98 - 106
  • [27] Conoscenti M, 2016, I C COMP SYST APPLIC
  • [28] The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
    Conti, Mauro
    Li, Qian Qian
    Maragno, Alberto
    Spolaor, Riccardo
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 2658 - 2713
  • [29] Analyzing Android Encrypted Network Traffic to Identify User Actions
    Conti, Mauro
    Mancini, Luigi Vincenzo
    Spolaor, Riccardo
    Verde, Nino Vincenzo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) : 114 - 125
  • [30] Issues and Future Directions in Traffic Classification
    Dainotti, Alberto
    Pescape, Antonio
    Claffy, Kimberly C.
    [J]. IEEE NETWORK, 2012, 26 (01): : 35 - 40