• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Cryptographic Based Secure Model on Dataset for Deep Learning Algorithms

    2021-12-10 11:57:26MuhammadTayyabMohsenMarjaniJhanjhiIbrahimAbakerTargioHashimAbdulwahabAliAlmazroiandAbdulaleemAliAlmazroi
    Computers Materials&Continua 2021年10期

    Muhammad Tayyab,Mohsen Marjani,N.Z.Jhanjhi,Ibrahim Abaker Targio Hashim,Abdulwahab Ali Almazroi and Abdulaleem Ali Almazroi

    1School of Computer Science and Engineering(SCE),Taylor’s University Lake-Side Campus,Subang Jaya,47500,Malaysia

    2Department of Computer Science,College of Computing and Informatics,University of Sharjah,Sharjah,27272,UAE

    3University of Jeddah,College of Computing and Information Technology at Khulais,Department of Information Technology,Jeddah,Saudi Arabia

    4Department of Computer Science,Rafha Community College,Northern Border University,Arar,91431,Saudi Arabia

    Abstract:Deep learning(DL)algorithms have been widely used in various security applications to enhance the performances of decision-based models.Malicious data added by an attacker can cause several security and privacy problems in the operation of DL models.The two most common active attacks are poisoning and evasion attacks,which can cause various problems,including wrong prediction and misclassification of decision-based models.Therefore,to design an efficient DL model,it is crucial to mitigate these attacks.In this regard,this study proposes a secure neural network(NN)model that provides data security during model training and testing phases.The main idea is to use cryptographic functions,such as hash function(SHA512)and homomorphic encryption(HE)scheme,to provide authenticity,integrity,and confidentiality of data.The performance of the proposed model is evaluated by experiments based on accuracy,precision,attack detection rate(ADR),and computational cost.The results show that the proposed model has achieved an accuracy of 98%,a precision of 0.97,and an ADR of 98%,even for a large number of attacks.Hence,the proposed model can be used to detect attacks and mitigate the attacker motives.The results also show that the computational cost of the proposed model does not increase with model complexity.

    Keywords:Deep learning(DL);poisoning attacks;evasion attacks;neural network;hash functions SHA512;homomorphic encryption scheme

    1 Introduction

    In modern machine learning(ML)and artificial intelligence(AI)models,learning algorithms provide numerous innovative features for daily life applications.Such advancements of ML algorithms have shown many results in real-world scenarios in solving the data-driven problems,such as prediction of a patient’s data in the health care system[1],and system security logs for security audit and unmanned aerial vehicles(UAVs)[2].Deep learning(DL)has also achieved the highest maturity level and has been applied to numerous safety and security applications.The DL has been used in many crucial software applications,including the Internet of Things(IoT)[3],smart cities[4,5],modern education systems[6],surveillance models[7],vulnerability and malware detection[8],drone jets[9],robotics,and voice-controlled devices[10].With the application of DL models,many real-life data-driven problems,such as speech recognition,medical image processing,automated cervical cancer detection[11],and others[12],can be easily solved.Many modern services and applications use data-driven approaches to automate their operation and provide different benefits to users[13].In recent years,DL has yielded breakthroughs in many fields,such as learning algorithms[14].However,DL algorithms have made a prosperous milestone in security-sensitive applications[15]and health-related prediction models[16],including detection of spam and malicious emails[17],fraud detection[18],and malicious intrusion detection[19].The DL field includes a comprehensive range of different techniques,such as supervised learning algorithms,of which the most commonly used are neural networks(NNs)[20],support vector machine(SVM)[21],and decision trees[22].However,it should be noted that originally,most well-known DL algorithms were not designed for adversarial environments,especially for security-critical applications[23].

    The innovations and new features introduced by DL have caused many security problems,which can result in misclassification or wrong predictions of DL models.The most severe and challenging data security and privacy problems in DL models are caused by poisoning and evasion attacks.One of the most common causative attacks carried out during the training phase of learning algorithms is introducing carefully crafted “noise” or “poisoning” to training data.This attack is known as a poisoning attack,and it can mislead the learning process of a learning algorithm.Whereas,in the case of exploratory attacks that are known as evasion attacks,certain“good words” are injected into spam emails so that these spam emails will be labeled as nonspam emails and thus will bypass the spam detection system[24].Therefore,a secure model is needed to provide data and model security in DL.To address this challenge,this study designs and develops a secure model for DL by introducing cryptographic functions for secure DL services.By using cryptographic functions,critical organizations,such as research centers in hospitals or fraud detection companies,can work securely with the end-users while ensuring security to all involved parties[25].The proposed model follows the previous procedures but introduces hash function SHA512[26]and homomorphic encryption(HE)scheme to provide data integrity and confidentiality in DL algorithms.The hash functions are used to provide data authenticity regardless of whether data are modified or remain in the original state.Since hash functions are one-way functions and generate a fixed length of alphanumeric values independent of the input string,the proposed model uses a property of digital signature of data to check data authenticity.The HE is used to provide data integrity and confidentiality in the learning process of a DL model[27].The HE allows a DL model to perform mathematical operations over encrypted data but prevents input data from leaking information to a host model.Therefore,for an adversary,it is hard to break the security of HE.

    1.1 Threat Model and Problem Statement

    DL models play a vital role in classification and prediction tasks in different environments.Data used for training and testing of DL models are commonly gathered from numerous untrustworthy sources.Therefore,it is considered as a standard that a DL model should operate normally,consistent with outcomes,regardless of internal problems and complexity of the model.However,the primary motive of attackers is to obtain the information on data and a DL model by injecting malicious data to subvert the normal working of the DL model.An attacker can manipulate the input data by inserting poisoned data that can divert predictions or lead to misclassification so that an intruder gains benefit.Hence,a secure model that can address security and privacy problems in DL models is urgently needed.The proposed secure model not only preserves data privacy but also provides model security with the help of common cryptographic schemes.

    1.2 Problem Description

    A universal threat,commonly known as a risk of data transmission,which can be caused either by side-channel attacks or by interception,is the main problem in DL algorithms.A strong cryptographic scheme provides strong measures against this threat by using encryption and signature schemes to secure data transmission through the network.However,it is hard to guarantee that data transmitted over the network have not been manipulated by attackers.There is a strong concern that an adversary can affect data and manipulate data for a DL model,for instance,via a poisoning attack.Also,an attacker can gain access to the DL model and subvert the training process,which can result in misclassification or wrong prediction.To overcome the mentioned threat,the HE scheme can be used to ensure data security and integrity.The HE allows operation on a ciphertext without decrypting the ciphertext,so a learning algorithm can use the ciphertext and perform prediction or classification.In this way,the third party does not have any access to the plain text,which guarantees data privacy.

    1.3 Contributions

    The main contribution of this works is the design of a secure NN model for DL algorithms that can preserve data privacy and provide data security in DL models.The contribution of this work can be summarized as follows:

    (1)A secure NN model against poisoning and evasion attacks during the training and testing phases of a DL model is developed to ensure data security.

    (2)Two cryptographic functions,the hash function SHA512 and HE scheme,are used to provide authenticity,integrity,and confidentiality of data.

    (3)The proposed model is evaluated based on accuracy,precision,attack detection rate(ADR),and computational cost.

    (4)The proposed model helps to maintain high accuracy and precision while ensuring appropriate ADR and lower computational cost compared to the original NN model.

    The rest of the paper is organized as follows.In Section 2,the related literature on security problems and security attacks in DL models,which can greatly affect DL models’performances,is presented.In Section 3,a detailed description of the proposed secure model,including methods,evaluation matrix,experimental setup,and data used for the implementation of the proposed secure model,is provided.In Section 4,the results and limitations of the proposed model are discussed.Finally,in Section 5,the main conclusions are drawn,and future work directions are given.

    2 Related Work

    In recent decades,DL has enhanced significantly in solving many problems in the AI field.However,this has caused challenging scientific problems,such as brain construction[28],and has faced various security challenges.These security and privacy challenges have a great impact on DL models during the prediction and classification processes[29].This study considers two types of active attacks,poisoning attacks and evasion attacks,which have been regarded as the most challenging security attacks in DL models[30].To address the problems caused by these two attach types,a secure model is developed.In the following,a few recent studies on the mentioned attacks are presented.

    2.1 Security and Privacy Issues in DL Algorithms

    As mentioned above,DL provides innovative features in learning models in various fields.For model training,DL requires a large amount of sensitive data to achieve high accuracy in classification and prediction[31].Data used for model training face a number of security and privacy issues.To address these security issues,secure and private AI(SPAI)was proposed by Carlini et al.[32].The SPAI aims to provide data security and privacy and offers a mechanism to mitigate the effects of adversarial attacks.However,this scheme significantly increases model complexity and computational cost.Caminero et al.[33]proposed a model that limits the effects of adversarial attacks using simple operations of the HE scheme,but it makes a DL model complex.

    One of the most severe security concerns in the DL field is data poisoning with adversarial examples,which can mislead a DL model.Ovadia et al.[34]developed an outlier detectionbased model to reduce the effects of optimal poisoning attack on the ML model performance.However,this model may constrain the prediction decision boundary significantly.Generally,data used for model training should be obtained from secure sources,but in practice,this is not always the case[35,36].The deep neural networks(DNNs)also face many security problems due to using adversarial examples that behave normally for observers.In recent years,there have been a large number of reported attacks in DNNs,which has affected the training and testing of DNN models[37,38].Papernot et al.[39]proposed an efficient model against security attacks that can be constructed using a highly effective classifier with the help of adversarial examples of DNN data.However,this malicious classification can cause additional constraints in adversarial examples,especially in the computer vision field.The potential defense mechanisms against crafted adversarial examples have also been evaluated.

    2.2 Security Attacks

    With the development of the AI field,learning algorithms have been widely explored by adversaries,and poisoning and evasion attacks have been further improved to achieve their goal of changing the learning data[40].The spam filter[41],DNNs[42],and classifier systems[43]are common DL areas that are strongly affected by poisoning and evasion attacks.In addition to other features,security has been considered as one of the most critical features of DL models.According to the related literature,two major types of active security attacks are poisoning and evasion attacks,and they can affect DL models’performances significantly.For instance,in the poisoning attack,an adversary is involved in the learning phase of a DL model and tends to subvert certain processes as normal processes,while in the evasion attack,an adversary is engaged to sabotage the classification of a DL model during the model testing phase.The data used by an attacker to initiate the mentioned attacks are known as adversarial data.An attacker can use different data to realize malicious activity depending on an attack scenario of a DL model[44].Generally,there are two main types of attack scenarios.In the first type,all model settings,including parameters and values of hyper-parameters,are available to an attacker,and such an attack is known as a whitebox attack[45];this attack has a very high success rate of getting information from a targeted model.In the second type,an adversary has limited knowledge and has no information on the model and its parameters,and this attack is known as a blackbox attack;this attack has a very low success rate of getting the information from a target model.

    2.2.1 Poisoning Attacks

    In poisoning attacks,attackers intentionally insert malicious data or add malicious noise to the training data to divert the normal learning process or to mislead or misclassify the training data toward the wrong prediction.An attacker can generate malicious noise by interpreting the output pattern of a target model,which is known as poisoning attacks[46].Several methods for poisoning attacks have been launched against traditional DL algorithms,such as SVM and LASSO.

    2.2.2 Evasion Attacks

    In evasion attacks,the primary objective of an adversary is to add additional noise to the test data by analyzing the output pattern of a target model.An attacker can also inject malicious queries into data to get wanted information,and once the attacker generates an output pattern similar to that of the target model,the attacker can replace the original data with malicious data.This can be difficult while evaluating security-sensitive applications.In this case,the classifier of the target model will become a malicious classifier,which will result in incorrect classification results.In the case of geo-metrics,the evasion attacks replace the test data with adversarial data to sabotage the normal training process.

    3 Methodology

    In this section,the proposed secure model that can preserve data privacy and security during the training and testing phases of a DL model is described in detail.First,the methods used in the proposed model are introduced.Then,the evaluation criteria are defined,and the evaluation matrix is categorized into two major parts,which are performance and evaluation of the operation of the proposed model.Finally,the experimental verification of the proposed model is conducted,and the results of the proposed model are compared with those of the conventional NN model.

    3.1 Methods

    In the proposed model,there are three major phases:Phase 1 that includes applying hash function SHA512 and HE,Phase 2 that includes decryption and verification of data,and Phase 3 that includes training of a DL Algorithm for classification and prediction.The phases of the proposed model are presented in Fig.1.

    3.1.1 Phase 1

    In Phase 1,the proposed secure model calculates the hash value by applying the hash functions,which is verified in Phase 3.The hash value can be considered as a digital signature and can be used for data verification.In this way,poisoning and evasion attacks can be easily detected,and it can be determined whether data have been compromised with additional noise.

    The specific steps are as follows:

    (a)Hash function SHA512 is applied to data get hash valueH0and appended as a part of data attribute.

    (b)Once the hash value is appended as part of data,it is encrypted using the HE encryption mechanism to ensure data privacy and stored to cloud storage for further processing.

    Figure 1:Phases of proposed model

    Algorithm 1:Hash and Encrypt Input:dataset D0,Key Output: DHash,DEncrypted,Upload 1 Procedure HASH(D0)2 Forimages/BZ_1158_375_1594_394_1640.pngi ←n)do 3H0=Hash(Ri[j])∴For each row of dataset 4DHash=D0||H0∴Hash value in appended into the dataset 5 DEncrypted=Encrypt(DHash,Key)∴Using homomorphic encryption 6 return DEncrypted 7 Upload the Encrypted data to cloud

    3.1.2 Phase 2

    In Phase 2,data are first retrieved from the cloud storage and then decrypted to obtain the original dataset.Next,the hash function SHA512 is again applied to the data,and the second hash valueH1is computed.It should be noted that while the second hash value is computed,the previous hash value is not used.Then,the hash valuesH0andH1are compared to evaluate data integrity.

    The specific steps of Phase 2 are as follows:

    (a)Encrypted data are retrieved from cloud storage.

    (b)The HE is applied to the data to obtain the original data that have been outsourced.

    (c)The second hash valueH1is computed to check data integrity by comparison of this hash value with the previous hash valueH0.

    (d)If the hash values match,the proposed model proceeds to Phase 3;otherwise,the model

    stops operation.

    3.1.3 Phase 3

    In Phase 3,after data verification in Phase 2,the proposed model performs data sampling,i.e.,the data are split into training and test data.

    The specific steps of Phase 3 are as follows:

    (a)Split data into training and test data.

    (b)Normalized data to obtain the image pixel values between +0.5 and -0.5 by using Eqs.(1)and(2)respectively.

    (c)After data normalization,train the DL model with the training data.

    (d)Test the trained DL model using the test data to evaluate the performance of the trained DL model.

    Algorithm 2:Hash and Decrypt Input: DEncrypted,key Output:Clean Dataset Dclean Attack_Rate 1 Procedure Decrptimages/BZ_1159_666_1399_684_1445.pngDEncrpted,key)2 DDecrypt=Decrptimages/BZ_1159_658_1454_677_1500.pngDEncrpted,key)3 Forimages/BZ_1159_402_1508_421_1554.pngi ←n)do 4H1=Hash(Ri[j])∴For each row of dataset 5DHash_1=D1||H1∴Hash value in appended again into the dataset 6 If(H0==H1)∴Comparison of Two hash values for authentication 7Rate=(False_obs/Total_obs)∴Computer Attack Detection rate 8Proceed toward phase 3 9Dclean=R_Colimages/BZ_1159_646_1869_669_1915.pngimages/BZ_1159_654_1832_673_1878.pngDhash_1)∴Remove the hash columns 10Return Dclean 11 Else 12Return “The dataset has been intruded maliciously”13Return Dclean,Attack_Rate

    3.2 Evaluation Matrix

    The evaluation of the proposed model is conducted using the evaluation matrix.The evaluation matrix is divided into two sub-categories,performance evaluation and execution evaluation.The most common evaluation metrics used in the state-of-the-art literature are used in the model evaluation process.The accuracy of predicting the correct labels as well as adversarial labels is also analyzed.The conventional NN model is used to further evaluate the proposed model via the comparison of the models on the same data.In addition to the prediction accuracy,the proposed model is evaluated based on precision and ADR.The performance evaluation procedure and parameters are described in the following.

    Algorithm 3:Data Sampling and Model training Input: Dclean,ModelParamDtrain,Dtest Output: ModelTrainedModelEvaluated Accuracy,Precision 1 Procedure Data_Sampling()2 Dtrain,Dtest=Data_Sampling(Dclean)3 Dtrain=((Dtrain/255)?0.5)∴Data Normalization 4 Dtest=((Dtest/255)?0.5)∴Data Normalization 5 Modeltrain=Learning_Model(Dtrain)6 ModelEvaluated=Evaluation_Model(Dtest)7 Accuracy=(tp+tn)/(tp+tn+fp+fn)?100 8 precision=tp/(tp+fp)9 Return Accuracy,Precision

    3.2.1 Performance Evaluation

    a)Wall-Clock Running Time

    The running time refers to the time a system requires to execute a certain program.This parameter is considered as a default parameter,as reported in the previous literature[47].It depends on hardware,which means that it is directly dependent on the system configuration,including available memory space and computational power of the system.It is also dependent on the encryption scheme used in a model.The running time of the proposed model isand it is computed asymptotically.

    b)Hardware/Software Setup

    The proposed model was experimentally verified using a PC with an Intel Core i5 3.5 GHz CPU and 16 Gb of RAM running on a Windows 10 operation platform.The HE library namedcryptography.fernet[48]was used.The proposed cryptographic function was compared with the previous cryptographic functions.

    3.2.2 Execution Evaluation

    a)Accuracy

    Accuracy has been commonly used as an evaluation metric of NN-based classification models.The accuracy is regarded as the most reliable metric,and it shows how well a model process input data.Typically,accuracy is expressed in percentage.The accuracy can be regarded as a fraction of predictions that a model predicted correctly[49,50].The accuracy is given by Eqs.(3)and(4):

    wheretpdenotes true positive,tndenotes true Negative,fpstands for false positive,andfnstands for false negative observations.

    b)Precision

    Precision is defined as a ration of the number of correct positively classified example to the number of all the positive label examples classified by the model[51,52].The precision has a value between zero and one.The precision depicts how well the model behaves when it is exposed against adversarial data or any attack scenario.The precision of a model can be expressed as in Eq.(5):

    wheretp:True positive,andfp:False Positive

    3.2.3 Attack Detection Rate

    Attack Detection Rate(ADR),which represents the ratio of true positive and the total outcomes of the model.Given below is the representation of ADR in Eq.(6):

    wheretpandfnare the representations of true positive and false negative[53].

    3.3 Experiment

    The proposed model is verified by experiments.However,since the proposed secure model uses two cryptographic functions to provide data privacy and security,a detailed explanation of cryptographic functions is given first.

    3.3.1 Hash Function(SHA-512)

    Hashing algorithms have been used in various fields,such as internet security and digital certificates.The hash functions play a vital role in the field of cryptography for providing digital security to online content[54].Usually,hash functions take an arbitrary length of the input stream and generate a fixed-length hash value called the hash digest that consists of alphanumeric values and does not have any particular meaning.The output of hash functions should meet certain conditions,which are as follows:

    (i)Uniform distribution:As the output of hash functions has a fixed length,and the input of hash functions can vary in length,different input values should not generate the same output stream.

    (ii)Fixed length:The output of hash functions should have a unique value and fixed length.

    (iii)Collision Resistance:Hash functions should generate similar output values for different inputs to make it difficult to distinguish two different hash values.

    The proposed model uses the SHA-512 hash function.This function takes an arbitrary length as input data and generates a 512-bit long alphanumeric value as an output.Hash functions have been widely used as digital signatures for digital content.The proposed model uses hash functions to provide data authenticity.For instance,data can be modified by an attacker by adding malicious data to the original,clean data to obtain the information on learning algorithms.In such a case,a hash function can detect malicious activity on data.

    The MNIST dataset[55]that contains pixel values of handwritten digits of 28 × 28 images was used in the experiment.The proposed model computed hash values of all features of a single label,including the label,and appended to the data as additional features.This process was repeated for each label of the MNIST dataset.

    3.3.2 Homomorphic Encryption(HE)

    The HE scheme is used to ensure data security and maintain data integrity.The HE preserves the structure of a plaintext message,so different mathematical operations,such as addition and multiplication,can be conducted over the encrypted data that is commonly known as a ciphertext[56].Similar to other security assurance schemes,the HE includes three functions denoted asGen,Enc,andDec,which are used for key generation,encryption,and decryption,and defined by Eqs.(7)and(8),respectively.

    In 1978,Kaaniche et al.[57]used the HE for the very first time,and since then,it has been improved by many researchers.However,most of the encryption functions have certain limitations;for instance,in the Pailier cryptosystem,there is only the addition operation.This type of encryption is commonly known as somewhat homomorphic encryption(SHE)[58].The first fully homomorphic encryption(FHE)was introduced in 2009 after the successful removal of additional noise in the HE.The FHE not only can support a circuit with an arbitrary depth but can also conduct multiple operations while performing encryption and decryption.However,this significantly increases the computation cost,which makes the FHE impractical for real-world applications.By introducing certain improvements into the original HE,the leveled homomorphic encryption(LHE)has been proposed,which makes the HE faster and reduces the computational cost.The LHE has the advantage of not using bootstrapping,thus allowing circuits to have a depth lower than a certain threshold.In terms of computational cost,if the number of steps is known,then the LHE can be used instead of the FHE.To summarize,using a limited number of operations,such as addition and multiplication,can decrease the computational cost and increase the efficiency of HE schemes,which has been used in the proposed NN model.

    3.3.3 Model Setting

    A simple NN was developed and denoted as the original NN model.The proposed model was a sequential model that consisted of two layers with 64 neurons having the ReLU activation function and one layer with 10 neurons having the softmax activation function.The initial model parameters were fine-tuned by the optimization using “adam”optimizer and “categorical_crossentropy”loss function for multiclass classification.The “categorical_crossestropy” was used as a loss function because it is very successful in the classification of multiple classes.The accuracy was used as an evaluation metric.The proposed model was developed using the MNIST dataset with a total of 60,000 images,of which 50,000 images were used for model training,and the remaining 10,000 images were used for model testing.In the model training process,the maximum number of epochs was set to five,and batch size was set to 32.

    3.4 Dataset

    The handwritten numerical digits 0–9 of the MNIST dataset,which contained 28 × 28 greyscale images of ten different classes,were used for model development(10-class classification task).This dataset has been used as a general dataset for the training and testing of many DL algorithms.It consists of 50,000 training images and 10,000 images test images.Although the MNIST is a simple dataset,it has been the standard benchmark for homomorphic inference tasks[59]and has been used for classification and prediction tasks by many DL models.

    4 Results and Discussion

    This section presents the results of the proposed model.The accuracy,precision,and ADR metrics were used for verification of the proposed model.The proposed model was compared with the original NN model,which was denoted as a benchmark.Compared to the original model,the proposed model had an additional layer that included the cryptographic function to provide data security during model training and testing.

    4.1 Experimental Correctness

    The model parameters were set so that the output after the decryption function must be correct.The encryption function was applied to both training and test data simultaneously.Based on the results,there was no accuracy loss on the plain text;the accuracy results were 98.89%for training and 98.90 for test data.The precision error,calculated compared to the decrypted outputs,was 0.05%[60].The error was caused by the mathematical computation that could create variations in floating points for encryption and decryption functions.However,this error did not affect the accuracy of the proposed model significantly.

    4.2 Accuracy Results

    The proposed model was developed using the latest version of the Python programing language.The accuracy was computed for both the proposed model and the original NN model.The results showed that the accuracy of the proposed model was almost the same as that of the original NN model,having only a minor difference that was caused by the computational complexity,which was due to mathematical operations of encryption and decryption.This shortcoming can be overcome by reducing the number of operations in the encryption and decryption processes.We have mentioned the experimental correction in the previous section to elaborate on a minor difference in terms of accuracy.The main goal was to maintain high accuracy level of the proposed model while achieving a high attack detection rate.The accuracy difference between the two models is shown in Fig.2a,where the two models achieved similar accuracies.Moreover,different scenarios were created based on the recent literature for evaluation of the proposed model’s accuracy.Since the proposed model used the cryptographic function,HE for encryption and decryption,the DL model was used on an encrypted dataset.The DL model could be applied to an encrypted dataset because the HE allowed operations over encrypted data.In this regard,the accuracy of the proposed model was calculated when it was trained with an encrypted dataset,and the obtained result is presented in Fig.2b,where,in this case,the accuracy of the proposed model showed a slight decrease because of mathematical computations and floating values.

    The proposed model was also tested under the attacker scenarios using adversarial data of FGSM attack(poisoning attack)and JSMA attack(evasion attack).The results of the proposed model when it was exposed to the poisoning and evasion attacks are presented in Figs.3 and 4,respectively.The training and test results of the two models were compared for the cases without and with attacks.In the experimental scenario,the attacker injected malicious data to achieve high accuracy.The results confirmed that the attacker could achieve high accuracy by injecting equivalent adversarial data,but when the model was evaluated using the test dataset,the accuracy dropped slightly,as presented in Figs.3a and 3b,and Figs.4a and 4b,respectively.The accuracy comparison of the proposed model and the existing HME cryptographic techniques used in NN models to provide data security is presented in Tab.1.As shown in Tab.1,the accuracy of the proposed model was of the same level as those of the existing models,and a minor drop in the accuracy of the proposed model was due to additional mathematical operations in encryption and decryption.In addition,the proposed model has achieved better accuracy than the existing techniques.The results of the proposed model show that the accuracy is improved while the computational cost is not increased significantly.

    Figure 2:Accuracy results(a)without encryption(b)with encryption

    Figure 3:Accuracy results(a)without FGSM(b)with FGSM(poisoning attack)

    Figure 4:Accuracy results(a)without JSMA(b)with JSMA(evasion attacks)

    4.3 Precision Results

    The precision is the ratio of totally positively predicted to the total prediction of the model.We have provided the precision values of proposed model and compared this value to the precision value of original model.In Tab.2,we have provided the results,which shows that there is slightly difference between the values because of additional security layer.

    4.4 Attack Detection Rate Results

    The ADR results of the proposed model are given in Tab.3.As mentioned above,the proposed model was tested using two widely-used attack types,FGSM(poisoning attack)[61]and JSMA(evasion attack)[62].The results showed that the proposed model could detect the attacks efficiently while keeping the accuracy at a relatively high level;namely,the accuracy of the proposed model did not drop below the threshold level.To the best of the authors’knowledge,the proposed method has been the only method that can identify these attacks while achieving good accuracy.In the proposed model,the threshold level for critical systems was set to a fixed value,and it was assumed that the attacker’s primary goal was to obtain the information on data as well as the DL model.Hence,if the ADR was greater than the threshold,the proposed model would terminate prediction or classification and return to the data sampling step.Analyzing this use case is very useful since it is very common in many critical systems,including health care systems and UAVs.

    Table 1:Comparison with existing HE methods with proposed model

    Table 2:Precision values of proposed model and original model

    Table 3:Attack detection rate of proposed model

    4.5 Computational Cost

    The computation cost is depended on the system configuration as well as the processing power of a machine.In the proposed model,although cryptographic functions are used,the overall computation has increased but not significantly.The computational cost is the only limitation of the proposed model,but it can be reduced by decreasing the number of operations and using a different optimization solution.The computational cost of the proposed model is defined by Eqs.(9)–(13):

    wherePMrepresent the proposed model,cndenotes the cost,and Θ shows the tighter analysis of the proposed model.The computational cost of the proposed model is not greater thanand the computational cost of the original model is Θ(nlogn).Hence,there is a slight increase in the computational cost of the proposed model compared to the original model.

    5 Conclusion

    The DL has become one of the research hotspots because of its decision-based problemsolving nature in daily-life applications.In the DL model design,security and privacy concerns are the main challenges.Namely,an attacker can consciously add noise to the data,which can result in misclassification or wrong prediction.Therefore,it is important to address security and privacy problems before designing and applying a DL model.In this study,two major types of attacks,poisoning and evasion attack,are considered,and a secure NN model that can provide data security is proposed.The proposed model uses two cryptographic functions,the hash function SHA512 and the HE schemes,to maintain integrity,confidentiality,and authenticity of data.The results have been calculated in terms of accuracy,precision,ADR,and computational cost.The result has provided an accuracy of 98% and a precision of 0.97 level as compared with the original benchmark model.The proposed model is verified by the experiments,and the experimental results show that the proposed model can achieve high ADR even under a larger number of attacks.Moreover,although the proposed model has additional operations,the computational cost of the proposed model is still in the acceptable range.Therefore,the proposed model can resolve privacy and security problems in the case of poisoning and evasion attacks.In future work,other types of security attacks,such as model extraction and model inversion attack,will be considered to further evaluate the robustness of the proposed model.

    Acknowledgement:The authors would also like to thank the Taylors University for their support in conducting the experiment.

    Data Availability:The data used to support the findings of this study are available from the corresponding author upon request.

    Funding Statement:The author(s)received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    最近中文字幕2019免费版| 日本vs欧美在线观看视频 | 国产91av在线免费观看| 中文乱码字字幕精品一区二区三区| 汤姆久久久久久久影院中文字幕| 欧美最新免费一区二区三区| 国产高潮美女av| 2022亚洲国产成人精品| 日韩大片免费观看网站| xxx大片免费视频| 国产高清国产精品国产三级 | 国产欧美日韩一区二区三区在线 | 欧美xxxx黑人xx丫x性爽| 国产淫片久久久久久久久| 中文字幕免费在线视频6| 18+在线观看网站| 性高湖久久久久久久久免费观看| 日韩av不卡免费在线播放| 亚洲熟女精品中文字幕| 一级片'在线观看视频| 天美传媒精品一区二区| 日韩亚洲欧美综合| 啦啦啦啦在线视频资源| 亚洲国产毛片av蜜桃av| 日日摸夜夜添夜夜添av毛片| 看十八女毛片水多多多| 国产有黄有色有爽视频| 精华霜和精华液先用哪个| 欧美国产精品一级二级三级 | 久久人人爽人人爽人人片va| 视频中文字幕在线观看| 春色校园在线视频观看| 成人亚洲精品一区在线观看 | 尤物成人国产欧美一区二区三区| 精品视频人人做人人爽| kizo精华| 成人免费观看视频高清| 国产精品一区二区性色av| 人体艺术视频欧美日本| 日韩国内少妇激情av| 另类亚洲欧美激情| 国产大屁股一区二区在线视频| 三级国产精品片| 丰满少妇做爰视频| 色视频在线一区二区三区| 欧美国产精品一级二级三级 | 永久网站在线| 久久久久久久久久久免费av| 联通29元200g的流量卡| 成人二区视频| av国产久精品久网站免费入址| 一本久久精品| 一级毛片久久久久久久久女| 成人国产麻豆网| 精品人妻偷拍中文字幕| www.av在线官网国产| 联通29元200g的流量卡| 国产白丝娇喘喷水9色精品| av福利片在线观看| av.在线天堂| 这个男人来自地球电影免费观看 | 丰满迷人的少妇在线观看| 国产国拍精品亚洲av在线观看| 男女国产视频网站| 高清欧美精品videossex| 久久久久网色| 国产精品久久久久久精品电影小说 | 国产精品成人在线| 最黄视频免费看| 精品国产三级普通话版| 蜜臀久久99精品久久宅男| 精品国产一区二区三区久久久樱花 | 国产成人一区二区在线| 久久精品熟女亚洲av麻豆精品| 观看免费一级毛片| 久久精品国产亚洲av天美| 中文字幕制服av| 91精品国产九色| 91精品国产九色| 天堂俺去俺来也www色官网| 亚洲精品第二区| 夜夜骑夜夜射夜夜干| 少妇猛男粗大的猛烈进出视频| 成人特级av手机在线观看| 欧美国产精品一级二级三级 | 五月玫瑰六月丁香| 99热网站在线观看| 深夜a级毛片| 欧美日韩在线观看h| 国产极品天堂在线| 亚洲激情五月婷婷啪啪| 欧美精品人与动牲交sv欧美| 寂寞人妻少妇视频99o| 欧美区成人在线视频| 女人久久www免费人成看片| 在线精品无人区一区二区三 | 美女主播在线视频| 久久国产乱子免费精品| 免费不卡的大黄色大毛片视频在线观看| 又粗又硬又长又爽又黄的视频| 少妇裸体淫交视频免费看高清| 亚洲欧美中文字幕日韩二区| 欧美丝袜亚洲另类| 香蕉精品网在线| 一级爰片在线观看| 伦精品一区二区三区| 亚洲,欧美,日韩| 99精国产麻豆久久婷婷| 亚洲精品乱码久久久久久按摩| 亚洲美女黄色视频免费看| 欧美日韩精品成人综合77777| 欧美日韩在线观看h| 99热网站在线观看| 777米奇影视久久| 夫妻午夜视频| 各种免费的搞黄视频| 少妇的逼好多水| 深爱激情五月婷婷| 舔av片在线| 国产精品爽爽va在线观看网站| 青青草视频在线视频观看| 久久ye,这里只有精品| 国产男女内射视频| 丰满迷人的少妇在线观看| 成人漫画全彩无遮挡| 久久韩国三级中文字幕| 卡戴珊不雅视频在线播放| 免费观看性生交大片5| 97热精品久久久久久| 一级毛片我不卡| 亚洲av综合色区一区| 成年女人在线观看亚洲视频| 欧美一级a爱片免费观看看| 另类亚洲欧美激情| 女性生殖器流出的白浆| 在线观看av片永久免费下载| 国产精品秋霞免费鲁丝片| 国产高清国产精品国产三级 | av专区在线播放| 国产高清三级在线| 亚洲人成网站高清观看| 在线观看一区二区三区激情| 在线观看一区二区三区激情| 久久国产精品男人的天堂亚洲 | 精品一品国产午夜福利视频| 国产成人精品一,二区| 少妇精品久久久久久久| 亚洲第一av免费看| 免费少妇av软件| 久久精品久久久久久噜噜老黄| av在线老鸭窝| 日韩亚洲欧美综合| 热99国产精品久久久久久7| 韩国av在线不卡| 日日啪夜夜爽| 亚洲av中文字字幕乱码综合| 熟女av电影| 人人妻人人澡人人爽人人夜夜| 最近中文字幕2019免费版| 亚洲美女黄色视频免费看| 黑人高潮一二区| 视频中文字幕在线观看| 人妻少妇偷人精品九色| 精品亚洲乱码少妇综合久久| 色5月婷婷丁香| 寂寞人妻少妇视频99o| 久久久久精品久久久久真实原创| 欧美日韩视频精品一区| 亚洲欧洲国产日韩| 亚洲欧洲国产日韩| 十分钟在线观看高清视频www | 99国产精品免费福利视频| 欧美激情国产日韩精品一区| 日本黄色日本黄色录像| .国产精品久久| 亚洲电影在线观看av| 国产成人精品久久久久久| 亚洲成人中文字幕在线播放| 国产亚洲午夜精品一区二区久久| 亚洲综合精品二区| av女优亚洲男人天堂| 亚洲精品日本国产第一区| 2021少妇久久久久久久久久久| 欧美性感艳星| 在线观看三级黄色| 久久久久久九九精品二区国产| 亚洲一区二区三区欧美精品| 日本av免费视频播放| 亚洲av成人精品一二三区| 我的女老师完整版在线观看| 亚洲国产欧美在线一区| 免费久久久久久久精品成人欧美视频 | 欧美精品亚洲一区二区| 啦啦啦啦在线视频资源| 蜜桃久久精品国产亚洲av| av在线老鸭窝| 97超碰精品成人国产| 人人妻人人澡人人爽人人夜夜| av.在线天堂| 精品人妻偷拍中文字幕| 亚洲精品,欧美精品| 99热国产这里只有精品6| 国产男人的电影天堂91| 中国国产av一级| 亚洲色图综合在线观看| 春色校园在线视频观看| 日韩 亚洲 欧美在线| 在线亚洲精品国产二区图片欧美 | 26uuu在线亚洲综合色| 国产精品一及| 丰满乱子伦码专区| 一级二级三级毛片免费看| 国产精品久久久久久av不卡| 亚洲av免费高清在线观看| 国产中年淑女户外野战色| 亚洲精品国产av蜜桃| 又黄又爽又刺激的免费视频.| 秋霞伦理黄片| 日本黄色日本黄色录像| 精品酒店卫生间| 亚洲电影在线观看av| 国产精品国产三级专区第一集| 国产精品成人在线| 国产成人91sexporn| 色哟哟·www| 国精品久久久久久国模美| 大片免费播放器 马上看| 国模一区二区三区四区视频| 亚洲国产精品成人久久小说| 欧美成人精品欧美一级黄| 亚洲人成网站高清观看| 亚洲国产精品999| 欧美日韩一区二区视频在线观看视频在线| 这个男人来自地球电影免费观看 | 2022亚洲国产成人精品| 99久久中文字幕三级久久日本| 免费久久久久久久精品成人欧美视频 | 黄色欧美视频在线观看| 欧美老熟妇乱子伦牲交| 日本免费在线观看一区| 一区二区三区精品91| 一级毛片 在线播放| 青春草亚洲视频在线观看| 一区二区三区免费毛片| 日本黄色片子视频| 狂野欧美激情性xxxx在线观看| 免费av中文字幕在线| 免费观看无遮挡的男女| 久久久色成人| 亚洲精品中文字幕在线视频 | 熟女人妻精品中文字幕| 一级爰片在线观看| 亚洲电影在线观看av| 久久久久精品久久久久真实原创| 日本爱情动作片www.在线观看| 一级黄片播放器| 亚洲av成人精品一区久久| 精品少妇黑人巨大在线播放| 只有这里有精品99| 一边亲一边摸免费视频| 国模一区二区三区四区视频| 国产亚洲一区二区精品| 国产深夜福利视频在线观看| 久久久久国产网址| 久久久亚洲精品成人影院| 国产成人91sexporn| 天堂8中文在线网| 老司机影院成人| 中文字幕亚洲精品专区| 美女中出高潮动态图| 岛国毛片在线播放| 日日啪夜夜撸| 亚洲精品乱久久久久久| 亚洲精品日本国产第一区| 一级毛片aaaaaa免费看小| 成人免费观看视频高清| 日韩av在线免费看完整版不卡| 国产成人91sexporn| 亚洲色图综合在线观看| 秋霞在线观看毛片| 黄色欧美视频在线观看| 国产在线视频一区二区| 日日啪夜夜撸| 亚洲欧洲日产国产| 精品一区二区三区视频在线| 亚洲人成网站高清观看| 欧美区成人在线视频| 少妇人妻一区二区三区视频| 一级a做视频免费观看| 成人无遮挡网站| 极品教师在线视频| 国产成人一区二区在线| 纵有疾风起免费观看全集完整版| 少妇人妻久久综合中文| 搡老乐熟女国产| 国产 精品1| 国产色爽女视频免费观看| 欧美激情极品国产一区二区三区 | 中文字幕av成人在线电影| 国产精品一及| 久久97久久精品| 超碰97精品在线观看| 人妻 亚洲 视频| 亚洲欧美精品自产自拍| 国产成人91sexporn| 一级毛片我不卡| videos熟女内射| 五月开心婷婷网| 国产一区二区三区av在线| 国产精品爽爽va在线观看网站| 熟女人妻精品中文字幕| 成人一区二区视频在线观看| 日本-黄色视频高清免费观看| 精品国产乱码久久久久久小说| 最近中文字幕高清免费大全6| 妹子高潮喷水视频| 欧美老熟妇乱子伦牲交| 亚洲精品日韩在线中文字幕| 91久久精品国产一区二区三区| 国内精品宾馆在线| 国产日韩欧美亚洲二区| 国产av精品麻豆| 日日撸夜夜添| 美女cb高潮喷水在线观看| 国产久久久一区二区三区| 伦理电影大哥的女人| 日本色播在线视频| 日韩成人av中文字幕在线观看| 青春草国产在线视频| 午夜免费男女啪啪视频观看| 亚洲一区二区三区欧美精品| 日韩中文字幕视频在线看片 | 午夜免费观看性视频| 国产爱豆传媒在线观看| 搡老乐熟女国产| 免费在线观看成人毛片| 精品一品国产午夜福利视频| 日韩欧美 国产精品| 国产精品国产三级国产av玫瑰| 欧美成人一区二区免费高清观看| 丝瓜视频免费看黄片| 三级经典国产精品| 一边亲一边摸免费视频| 少妇 在线观看| www.av在线官网国产| 高清日韩中文字幕在线| 久久久色成人| 亚洲性久久影院| 国产精品秋霞免费鲁丝片| 女性被躁到高潮视频| 日日摸夜夜添夜夜添av毛片| 国产伦精品一区二区三区视频9| 中文乱码字字幕精品一区二区三区| 亚洲精华国产精华液的使用体验| 国产黄色免费在线视频| 搡老乐熟女国产| 建设人人有责人人尽责人人享有的 | 久久精品国产亚洲网站| 人妻 亚洲 视频| 日韩av在线免费看完整版不卡| 国国产精品蜜臀av免费| 国产成人aa在线观看| 色5月婷婷丁香| 午夜日本视频在线| 免费大片18禁| 亚洲精品456在线播放app| 国产成人一区二区在线| 一区二区三区精品91| 偷拍熟女少妇极品色| 女人十人毛片免费观看3o分钟| 亚洲av不卡在线观看| 成人高潮视频无遮挡免费网站| 婷婷色综合大香蕉| 国产成人a∨麻豆精品| 亚洲精品一区蜜桃| 国产av精品麻豆| 色吧在线观看| 日本欧美国产在线视频| 小蜜桃在线观看免费完整版高清| 99热国产这里只有精品6| 大香蕉97超碰在线| 久久久欧美国产精品| 久久精品久久久久久噜噜老黄| 国模一区二区三区四区视频| 一级爰片在线观看| 亚洲精品乱码久久久久久按摩| 久久影院123| 久久久久久久大尺度免费视频| 三级经典国产精品| 一级毛片 在线播放| a 毛片基地| 日韩成人伦理影院| 五月伊人婷婷丁香| 我要看黄色一级片免费的| 国产午夜精品一二区理论片| 日本与韩国留学比较| av国产精品久久久久影院| 最近最新中文字幕大全电影3| 亚洲精品aⅴ在线观看| 国精品久久久久久国模美| 大又大粗又爽又黄少妇毛片口| 国产精品一区二区性色av| 亚洲精品国产成人久久av| 国产精品蜜桃在线观看| 两个人的视频大全免费| av在线播放精品| 大又大粗又爽又黄少妇毛片口| 国产精品无大码| 国产老妇伦熟女老妇高清| 日本黄色日本黄色录像| 国产精品一区二区在线不卡| 熟妇人妻不卡中文字幕| 自拍偷自拍亚洲精品老妇| 国产亚洲精品久久久com| 亚洲av中文字字幕乱码综合| 视频区图区小说| 国产精品99久久99久久久不卡 | 制服丝袜香蕉在线| 亚洲精品国产成人久久av| 蜜桃亚洲精品一区二区三区| 人人妻人人澡人人爽人人夜夜| 精品午夜福利在线看| 国产精品久久久久久精品古装| 99视频精品全部免费 在线| 一级a做视频免费观看| 一级av片app| 亚洲电影在线观看av| 国产精品精品国产色婷婷| 高清在线视频一区二区三区| 这个男人来自地球电影免费观看 | 干丝袜人妻中文字幕| 制服丝袜香蕉在线| 国产免费视频播放在线视频| 欧美高清成人免费视频www| 精品久久久久久电影网| 亚洲欧美日韩另类电影网站 | 亚洲精品久久久久久婷婷小说| 国精品久久久久久国模美| 极品少妇高潮喷水抽搐| 91午夜精品亚洲一区二区三区| 男人爽女人下面视频在线观看| 在线观看人妻少妇| 制服丝袜香蕉在线| 99九九线精品视频在线观看视频| 熟妇人妻不卡中文字幕| 三级国产精品欧美在线观看| 成人特级av手机在线观看| 女的被弄到高潮叫床怎么办| 亚洲第一区二区三区不卡| 国产精品一区二区在线不卡| 久久久久久人妻| 寂寞人妻少妇视频99o| 成人漫画全彩无遮挡| 亚洲不卡免费看| 人妻夜夜爽99麻豆av| 在线观看美女被高潮喷水网站| 又爽又黄a免费视频| 男的添女的下面高潮视频| 校园人妻丝袜中文字幕| 国产一区有黄有色的免费视频| 国产亚洲5aaaaa淫片| 亚洲国产最新在线播放| 日韩欧美一区视频在线观看 | 亚洲激情五月婷婷啪啪| 啦啦啦视频在线资源免费观看| 一级爰片在线观看| 中文欧美无线码| 亚洲精品国产av成人精品| 亚洲精品一二三| 一级毛片 在线播放| 国产视频内射| 夫妻性生交免费视频一级片| 丰满乱子伦码专区| 伊人久久国产一区二区| 汤姆久久久久久久影院中文字幕| 97热精品久久久久久| 中文资源天堂在线| 亚洲伊人久久精品综合| 国产大屁股一区二区在线视频| 在线看a的网站| 成人无遮挡网站| 久久鲁丝午夜福利片| 亚洲精品国产成人久久av| 一级爰片在线观看| 国产精品秋霞免费鲁丝片| 欧美丝袜亚洲另类| 欧美区成人在线视频| a级毛片免费高清观看在线播放| 中文字幕人妻熟人妻熟丝袜美| 国产黄频视频在线观看| 18禁裸乳无遮挡免费网站照片| 91精品一卡2卡3卡4卡| 国产亚洲91精品色在线| 纯流量卡能插随身wifi吗| 久久精品人妻少妇| 春色校园在线视频观看| 女人久久www免费人成看片| 亚洲精品国产成人久久av| 国产日韩欧美在线精品| 少妇人妻久久综合中文| 又爽又黄a免费视频| 亚洲综合色惰| 国产色爽女视频免费观看| 国产一区亚洲一区在线观看| 黄色欧美视频在线观看| 国产成人免费观看mmmm| 国产一级毛片在线| av在线蜜桃| 久久久久久久精品精品| 日本欧美视频一区| 五月伊人婷婷丁香| 51国产日韩欧美| 99视频精品全部免费 在线| av国产精品久久久久影院| 午夜免费男女啪啪视频观看| 爱豆传媒免费全集在线观看| 中文字幕制服av| 97精品久久久久久久久久精品| 免费看光身美女| 欧美国产精品一级二级三级 | 成年av动漫网址| 国产精品无大码| 五月天丁香电影| 久久久久久久久久成人| 免费久久久久久久精品成人欧美视频 | 永久免费av网站大全| 亚洲成人手机| 亚洲欧美日韩东京热| 色哟哟·www| 亚洲三级黄色毛片| 色婷婷av一区二区三区视频| 男人狂女人下面高潮的视频| 纵有疾风起免费观看全集完整版| 能在线免费看毛片的网站| 麻豆成人av视频| a级毛片免费高清观看在线播放| 极品少妇高潮喷水抽搐| 日韩中字成人| 亚洲精品中文字幕在线视频 | 少妇精品久久久久久久| 视频区图区小说| 亚洲精品456在线播放app| 国产精品福利在线免费观看| 亚洲精品第二区| 国产高潮美女av| 亚洲av免费高清在线观看| 九九在线视频观看精品| 18禁在线无遮挡免费观看视频| 大香蕉久久网| 美女福利国产在线 | 欧美日韩在线观看h| 嘟嘟电影网在线观看| 黄片无遮挡物在线观看| 国产69精品久久久久777片| 免费人妻精品一区二区三区视频| 国产 精品1| 男人舔奶头视频| 日韩一区二区三区影片| 亚洲欧美精品专区久久| 亚洲av综合色区一区| 日本午夜av视频| 韩国高清视频一区二区三区| 国产一区二区在线观看日韩| 精品人妻一区二区三区麻豆| 国产精品无大码| 午夜精品国产一区二区电影| 日韩不卡一区二区三区视频在线| 老师上课跳d突然被开到最大视频| 久久久久视频综合| 99久久精品一区二区三区| 亚洲精品国产色婷婷电影| 99国产精品免费福利视频| av卡一久久| 精品国产一区二区三区久久久樱花 | 大片电影免费在线观看免费| 国产免费又黄又爽又色| 最近最新中文字幕免费大全7| 尤物成人国产欧美一区二区三区| 精品国产三级普通话版| 纯流量卡能插随身wifi吗| 日本午夜av视频| 亚洲精品456在线播放app| 亚洲美女黄色视频免费看| 国产精品一二三区在线看| 日产精品乱码卡一卡2卡三| 97精品久久久久久久久久精品| 国产永久视频网站| 欧美精品亚洲一区二区| 国内少妇人妻偷人精品xxx网站| 亚洲国产精品成人久久小说| 久久热精品热| 狂野欧美白嫩少妇大欣赏| 日韩人妻高清精品专区| 日韩 亚洲 欧美在线| 精品人妻偷拍中文字幕| 国产美女午夜福利| 日韩一本色道免费dvd| 国产成人aa在线观看| 中文字幕av成人在线电影| 国产美女午夜福利| 亚洲精品视频女| 日韩一区二区三区影片| 街头女战士在线观看网站| 99热这里只有是精品在线观看| 免费高清在线观看视频在线观看| 欧美丝袜亚洲另类| 一区二区三区精品91| 黄色视频在线播放观看不卡| 在线观看av片永久免费下载| 啦啦啦啦在线视频资源| 国产精品av视频在线免费观看| 国产大屁股一区二区在线视频| 日韩av免费高清视频| 91狼人影院| 久久99热这里只频精品6学生|