Privacy and deep learning have been two of the most exciting research trends in both academia and industry. On the one hand, big data rapidly... Show morePrivacy and deep learning have been two of the most exciting research trends in both academia and industry. On the one hand, big data rapidly expedite lots of data orientated applications, especially like deep learning services. With the tremendous value exhibited by the data, the privacy of data subjects who generate the data, has also raised much attention. Meanwhile more regulations and legislation have been enacted or enforced, intending to enforce the companies and organizations to strictly comply with the personal privacy protection while collecting or utilizing their data. All these moves will substantially change the ways to train the deep learning models and provide AI services, and in some ways might hinder the development of deep learning if not coming up with some sophisticated mechanisms. On the other hand, deep learning has been showing incredibly promising performance in a variety of areas like face recognition, voice recognition, recommendation & advertising, autonomous driving, medical imaging, etc.. This keeps us thinking will deep learning also in turn influence privacy and be leveraged to compromise privacy. Meanwhile we also observe that mobile devices become so ubiquitous that more shares of data are generated on mobile devices, and mostly those data are both extremely sensitive for data subjects as well as extremely valuable for developing deep learning. We shouldn’t neglect the impact of mobile devices on both privacy and deep learning.In this thesis I explore the research on the interactions between privacy and deep learning, especially with the mobile devices being involved in. Specifically I work on: 1). How does privacy change the way we use the data when building deep learning models, and present the mechanism for privacy protection towards deep learning. 2). How does deep learning in turn make privacy more vulnerable to be compromised, and demonstrate the privacy compromise by facilitating deep learning to trace the source mobile devices and link the personal identities. Show less