Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

When AI Meets Information Privacy: The Adversarial Role of AI in Data Sharing Scenario

Full metadata record
DC Field Value Language
dc.contributor.authorMajeed, Abdul-
dc.contributor.authorHwang, Seong Oun-
dc.date.accessioned2023-08-25T08:41:29Z-
dc.date.available2023-08-25T08:41:29Z-
dc.date.created2023-08-25-
dc.date.issued2023-07-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/88850-
dc.description.abstractArtificial intelligence (AI) is a transformative technology with a substantial number of practical applications in commercial sectors such as healthcare, finance, aviation, and smart cities. AI also has strong synergy with the information privacy (IP) domain from two distinct aspects: as a protection tool (i.e., safeguarding privacy), and as a threat tool (i.e., compromising privacy). In the former case, AI techniques are amalgamated with the traditional anonymization techniques to improve various key components of the anonymity process, and therefore, privacy is safeguarded effectively. In the latter case, some adversarial knowledge is aggregated with the help of AI techniques and subsequently used to compromise the privacy of individuals. To the best of our knowledge, threats posed by AI-generated knowledge such as synthetic data (SD) to information privacy are often underestimated, and most of the existing anonymization methods do not consider/model this SD-based knowledge that can be available to the adversary, leading to privacy breaches in some cases. In this paper, we highlight the role of AI as a threat tool (i.e., AI used to compromise an individual's privacy), with a special focus on SD that can serve as background knowledge leading to various kinds of privacy breaches. For instance, SD can encompass pertinent information (e.g., total # of attributes in data, distributions of sensitive information, category values of each attribute, minor and major values of some attributes, etc.) about real data that can offer a helpful hint to the adversary regarding the composition of anonymized data, that can subsequently lead to uncovering the identity or private information. We perform reasonable experiments on a real-life benchmark dataset to prove the pitfalls of AI in the data publishing scenario (when a database is either fully or partially released to public domains for conducting analytics).-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.relation.isPartOfIEEE ACCESS-
dc.titleWhen AI Meets Information Privacy: The Adversarial Role of AI in Data Sharing Scenario-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid001040724700001-
dc.identifier.doi10.1109/ACCESS.2023.3297646-
dc.identifier.bibliographicCitationIEEE ACCESS, v.11, pp.76177 - 76195-
dc.description.isOpenAccessY-
dc.identifier.scopusid2-s2.0-85165380265-
dc.citation.endPage76195-
dc.citation.startPage76177-
dc.citation.titleIEEE ACCESS-
dc.citation.volume11-
dc.contributor.affiliatedAuthorMajeed, Abdul-
dc.contributor.affiliatedAuthorHwang, Seong Oun-
dc.type.docTypeArticle-
dc.subject.keywordAuthorAI-powered attacks-
dc.subject.keywordAuthorartificial intelligence-
dc.subject.keywordAuthorbackground knowledge-
dc.subject.keywordAuthorcompromising privacy-
dc.subject.keywordAuthordata publishing-
dc.subject.keywordAuthorpersonal data-
dc.subject.keywordAuthorprivacy-
dc.subject.keywordAuthorsafeguarding privacy-
dc.subject.keywordAuthorsynthetic data-
dc.subject.keywordAuthorutility-
dc.subject.keywordPlusUTILITY-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hwang, Seong Oun photo

Hwang, Seong Oun
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE