The security problem is that when we transmit those intermediate features to the cloud server, we need to  consider the man-in-the-middle attack, who can tap into the features and use Generative Adversarial  Networks to restore the private training data from the features. The possibility that the attacker can  recover the original data declines monotonically regarding the depth of the neural network. For VGG16,  the possibility is conv3-64, conv3-64 (90%); conv3-128, conv3-128(70%); conv3-256, conv3-256,  conv3-256 (40%); conv3-512, conv3-512, conv3-512 (20%); conv3-512, conv3-512, conv3-512 (5%), for  each filter module, the number indicates the number of filters (e.g., 512 filters) and the percentage  indicates the attack success rate (

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

The security problem is that when we transmit those intermediate features to the cloud server, we need to 
consider the man-in-the-middle attack, who can tap into the features and use Generative Adversarial 
Networks to restore the private training data from the features. The possibility that the attacker can 
recover the original data declines monotonically regarding the depth of the neural network. For VGG16, 
the possibility is conv3-64, conv3-64 (90%); conv3-128, conv3-128(70%); conv3-256, conv3-256, 
conv3-256 (40%); conv3-512, conv3-512, conv3-512 (20%); conv3-512, conv3-512, conv3-512 (5%), for 
each filter module, the number indicates the number of filters (e.g., 512 filters) and the percentage 
indicates the attack success rate (20%).
Now we want to achieve a balance between security and network bandwidth. For example, if we are 
transferring the first layer of 224x224x3, we are transferring 220x220x3x64 pixels with (1-90%) in the 
security gauge. We use a simple weighted formular to weigh the network bandwidth and security, Y = N 
+ a* S, where N = 220x220x3x64 + a*0.1, set a = 10^6. 
Compute the Y value for each filter bank. Note that you will need to calculate the correct output size from 
the convolutional layer. For example, the output size from the first conv3 layer is 224-3+1 = 222. After 
the second conv3 layer is 220x220x3. Show the computation for all the 64,128,256 and 512 layer 
modules (assume we partition the network at the end of each module).

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY