Secure Federated Matrix Factorization

نویسندگان

چکیده

To protect user privacy and meet law regulations, federated (machine) learning is obtaining vast interests in recent years. The key principle of training a machine model without needing to know each user’s personal raw private data. In this article, we propose secure matrix factorization framework under the setting, called FedMF. First, design user-level distributed where can be learned when only uploads gradient information (instead preference data) server. While seems secure, prove that it could still leak users’ end, enhance with homomorphic encryption. We implement prototype FedMF test real movie rating dataset. Results verify feasibility also discuss challenges for applying practice future research.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tensor Factorization via Matrix Factorization

Tensor factorization arises in many machinelearning applications, such knowledge basemodeling and parameter estimation in latentvariable models. However, numerical meth-ods for tensor factorization have not reachedthe level of maturity of matrix factorizationmethods. In this paper, we propose a newmethod for CP tensor factorization that usesrandom projections to ...

متن کامل

Matrix Factorization and Matrix Concentration

Matrix Factorization and Matrix Concentration by Lester Wayne Mackey II Doctor of Philosophy in Electrical Engineering and Computer Sciences with the Designated Emphasis in Communication, Computation, and Statistics University of California, Berkeley Professor Michael I. Jordan, Chair Motivated by the constrained factorization problems of sparse principal components analysis (PCA) for gene expr...

متن کامل

Secure Federated Data Retrieval in Clinical Trials

The clinical domain is one in which a plethora of data exists in repositories distributed across the globe, crossing institutional, regional and national boundaries. To be able to harness this data and move it across these boundaries has the potential to provide great scientific and medical insight, to the benefit of many protagonists in the field of clinical medicine. In this paper, we outline...

متن کامل

Secure Mobile Nodes in Federated Databases

Mobile computers pose special security risks since information contained on them can more easily be compromised. However, availability of information at the location where the mobile computer is to be used often outweighs the disadvantages. This paper proposes an approach to limit the risks of information compromise by caching only that information on the mobile computer that the user of the mo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Intelligent Systems

سال: 2021

ISSN: ['1941-1294', '1541-1672']

DOI: https://doi.org/10.1109/mis.2020.3014880