TY - JOUR
T1 - When Machine Learning Meets Privacy in 6G
T2 - A Survey
AU - Sun, Yuanyuan
AU - Liu, Jiajia
AU - Wang, Jiadai
AU - Cao, Yurui
AU - Kato, Nei
N1 - Publisher Copyright:
© 1998-2012 IEEE.
PY - 2020/10/1
Y1 - 2020/10/1
N2 - The rapid-developing Artificial Intelligence (AI) technology, fast-growing network traffic, and emerging intelligent applications (e.g., autonomous driving, virtual reality, etc.) urgently require a new, faster, more reliable and flexible network form. At this time, researchers in both industry and academia have turned their attention to the sixth generation (6G) communication networks. In the 6G vision, various intelligent application scenarios that utilize Machine Learning (ML) technology (the most important branch of AI) will bring rich heterogeneous connections, as well as massive information storage and operations. When ML meets 6G, new opportunities will emerge along with numerous privacy challenges. On one hand, a secure ML structure, or the correct application of ML, can protect privacy in 6G. On the other hand, ML may be attacked or abused, resulting in privacy violation. It is worth noting that the alliance between 6G and ML may also be a double-edged sword in many cases, rather than absolutely infringe or protect privacy. Therefore, based on lots of existing meaningful works, this paper aims to provide a comprehensive survey of ML and privacy in 6G, with a view to further promoting the development of 6G and privacy protection technologies.
AB - The rapid-developing Artificial Intelligence (AI) technology, fast-growing network traffic, and emerging intelligent applications (e.g., autonomous driving, virtual reality, etc.) urgently require a new, faster, more reliable and flexible network form. At this time, researchers in both industry and academia have turned their attention to the sixth generation (6G) communication networks. In the 6G vision, various intelligent application scenarios that utilize Machine Learning (ML) technology (the most important branch of AI) will bring rich heterogeneous connections, as well as massive information storage and operations. When ML meets 6G, new opportunities will emerge along with numerous privacy challenges. On one hand, a secure ML structure, or the correct application of ML, can protect privacy in 6G. On the other hand, ML may be attacked or abused, resulting in privacy violation. It is worth noting that the alliance between 6G and ML may also be a double-edged sword in many cases, rather than absolutely infringe or protect privacy. Therefore, based on lots of existing meaningful works, this paper aims to provide a comprehensive survey of ML and privacy in 6G, with a view to further promoting the development of 6G and privacy protection technologies.
KW - 6G
KW - communication
KW - double-edged sword
KW - machine learning
KW - Privacy
KW - protection
KW - violation
UR - http://www.scopus.com/inward/record.url?scp=85096771123&partnerID=8YFLogxK
U2 - 10.1109/COMST.2020.3011561
DO - 10.1109/COMST.2020.3011561
M3 - 文献综述
AN - SCOPUS:85096771123
SN - 1553-877X
VL - 22
SP - 2694
EP - 2724
JO - IEEE Communications Surveys and Tutorials
JF - IEEE Communications Surveys and Tutorials
IS - 4
M1 - 9146540
ER -