Data Heterogeneity Differential Privacy: From Theory to Algorithm

نویسندگان

چکیده

Traditionally, the random noise is equally injected when training with different data instances in field of differential privacy (DP). In this paper, we first give sharper excess risk bounds DP stochastic gradient descent (SGD) method. Considering most previous methods are under convex conditions, use Polyak-Łojasiewicz condition to relax it paper. Then, after observing that affect machine learning model extent, consider heterogeneity and attempt improve performance DP-SGD from a new perspective. Specifically, by introducing influence function (IF), quantitatively measure contributions various on final model. If contribution made single instance so little attackers cannot infer anything model, do not add it. Based observation, design ‘Performance Improving’ algorithm: PIDP-SGD. Theoretical experimental results show our proposed PIDP-SGD improves significantly.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analytic Theory to Differential Privacy

Sensitivity-based methods are extensively used to construct differentially private mechanisms. In this paper, we realize that designing a differentially private mechanism can be considered as finding a randomized mapping between two metric spaces. The metric in the first metric space can be considered as a metric about privacy and the metric in the second metric space can be considered as a met...

متن کامل

From Data Privacy to Location Privacy: Models and Algorithms

This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in data privacy area, the presenter describes the essential concepts, the alternative models, and the suite of techniques for providing location privacy in mobile and ubiquitous data management systems. The tutorial consi...

متن کامل

Publishing Set-Valued Data via Differential Privacy

Set-valued data provides enormous opportunities for various data mining tasks. In this paper, we study the problem of publishing set-valued data for data mining tasks under the rigorous differential privacy model. All existing data publishing methods for set-valued data are based on partitionbased privacy models, for example k-anonymity, which are vulnerable to privacy attacks based on backgrou...

متن کامل

Gradually Releasing Private Data under Differential Privacy

Aggregating individuals’ data and computing statistics over a population are key ingredients to enable the Internet of Things [1]. Constructing traffic maps from individuals’ GPS traces [2] and performing demand response in smart grids [3], [4] are two examples that involve such data aggregation. Using these statistics, individuals can perform their activities more efficiently; they may choose ...

متن کامل

Local Differential Privacy for Evolving Data

There are now several large scale deployments of differential privacy used to track statistical information about users. However, these systems periodically recollect the data and recompute the statistics using algorithms designed for a single use and as a result do not provide meaningful privacy guarantees over long time scales. Moreover, existing techniques to mitigate this effect do not appl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2023

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-35995-8_9