Data Inference: Data Security Threats in the AI Era

Zijun Wang , Ting Liu , Yang Liu , Enrico Zio , Xiaohong Guan

Engineering ›› 2025, Vol. 52 ›› Issue (9) : 29 -33.

PDF (962KB)
Engineering ›› 2025, Vol. 52 ›› Issue (9) :29 -33. DOI: 10.1016/j.eng.2025.08.007
Views & Comments
Data Inference: Data Security Threats in the AI Era
Author information +
History +
PDF (962KB)

Cite this article

Download citation ▾
Zijun Wang, Ting Liu, Yang Liu, Enrico Zio, Xiaohong Guan. Data Inference: Data Security Threats in the AI Era. Engineering, 2025, 52(9): 29-33 DOI:10.1016/j.eng.2025.08.007

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Liu T, Li Q, Shi J. Data leakage risks of public data in the big data era. Baomi Gongzuo 2018; 4:51-2. Chinese.

[2]

Confessore N. Cambridge Analytica and Facebook:the scandal and the fallout so far [Internet]. New York City: The New York Times; 2018 Apr 4 [cited 2025 Jan 2]. Available from: https://www.nytimes.com/2018/04/04/us/ politics/cambridge-analytica-scandal-fallout.html

[3]

Xiong Y, Register L, He L. China fines Didi $1.2 billion for violating cybersecurity and data laws [Internet]. Atlanta City: Cable News Network; 2022 Jul 21 [cited 2025 Jan 2]. Available from: https://edition.cnn.com/2022/07/21/economy/china-fines-didi-data-law-violation-intl-hnk/index.html

[4]

Liu T, Wang Z, Liu Y, Zhou Y, Wu J, Bao Y, et al. Data inference: data leakage paradigms and defense methods in cyber-physical systems. Sci Sin Inf 2023; 53 (11):2152-79. Chinese.

[5]

Nonnecke B, Carlton C. EU and US legislation seek to open up digital platform data. Science 2022; 375(6581):610-2.

[6]

Liu J, Luo Y, Zhong Z, Li K, Huang H, Xiong H. A probabilistic architecture of long-term vehicle trajectory prediction for autonomous driving. Engineering 2022; 19:228-39.

[7]

Garcia D. Leaking privacy and shadow profiles in online social networks. Sci Adv 2017; 3(8):e1701172.

[8]

Acquisti A, Gross R. Predicting social security numbers from public data. Proc Natl Acad Sci USA 2009; 106(27):10975-80.

[9]

Wang Z, Liu Y, Yu N, Wu Q, Wu J, Zhou Y, et al. Data inference from publicly available data: threats and defense methods in power systems. IEEE Trans Power Syst 2025; 40(1):1049-59.

[10]

European Parliament and Council of the European Union. General data protection regulation. 2016.

[11]

Force JT. Security and privacy controls for information systems and organizations. Gaithersburg: National Institute of Standards and Technology; 2020.

[12]

Mackenzie D. Surprising advances in generative artificial intelligence prompt amazement—and worries. Engineering 2023; 25:9-11.

[13]

Bento MEC. Physics-guided neural network for load margin assessment of power systems. IEEE Trans Power Syst 2024; 39(1):564-75.

[14]

Qiu Z, Wu J, Hu W, Du B, Yuan G, Yu PS. Temporal link prediction with motifs for social networks. IEEE Trans Knowl Data Eng 2023; 35(3):3145-58.

[15]

Zhao L, Song Y, Zhang C, Liu Y, Wang P, Lin T, et al. T-GCN: a temporal graph convolutional network for traffic prediction. IEEE Trans Intell Transp Syst 2020; 21(9):3848-58.

[16]

Guo Y, Liu Z, Huang C, Wang N, Min H, Guo W, et al. A framework for threat intelligence extraction and fusion. Comput Secur 2023; 132:103371.

[17]

Narvala H, McDonald G, Ounis I. RelDiff:enriching knowledge graph relation representations for sensitivity classification. In: Findings of the Association for Computational Linguistics: EMNLP 2021. Stroudsburg: Association for Computational Linguistics; 2021. p. 3671-81.

[18]

Gadotti A, Rocher L, Houssiau F, Cre¸tu AM, de Montjoye YA. Anonymization: the imperfect science of using data while preserving privacy. Sci Adv 2024; 10 (29):eadn7053.

[19]

Ganev G, Xu K, De Cristofaro E. Graphical vs. deep generative models:measuring the impact of differentially private mechanisms and budgets on utility. In:Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security; 2024 Oct 14-18; Salt Lake City, UT, USA. New York City: Association for Computing Machinery; 2024. p. 1596-610.

[20]

Liu Q, Yan Y, Jin Y, Wang X, Ligeti P, Yu G, et al. Secure federated evolutionary optimization—a survey. Engineering 2024; 34:23-42.

[21]

Wang D, Zou Y, Zhang Z, Xiu K. Password guessing using random forest. In: Calandrino J, Troncoso C, editors. Proceedings of the 32nd USENIX Security Symposium; 2023 Aug 9-11; Anaheim, CA, USA. Berkeley: USENIX Association; 2023. p. 965-82.

PDF (962KB)

2521

Accesses

0

Citation

Detail

Sections
Recommended

/