3 Differential privacy for machine learning (Part-2)

 

This chapter covers

  • Design principles of differentially private machine learning algorithms
  • Designing and implementing differentially private supervised learning algorithms (e.g., Naive Bayes classification, logistic regression, and linear regression)
  • Designing and implementing differentially private unsupervised learning algorithms (e.g., K-means clustering)
  • Working with a case study on “Differentially Private Principal Component Analysis” to walk you through the process of designing and analyzing a differentially private machine learning algorithm

In the previous chapter, we investigated the definition and general usage of differential privacy and the properties of differential privacy that work under different scenarios (e.g., post-processing property, group property, and composition properties). We also looked into common and widely adopted differentially private mechanisms that have served as essential building blocks in various privacy-preserving algorithms and applications. This chapter will walk through how to use those building blocks to design and implement multiple differentially private machine learning algorithms and how to apply such algorithms in real-world scenarios. This will be our second part of differential privacy for machine learning.

Timeline Description automatically generated

3.1 How to Apply Differential Privacy in Machine Learning?

3.2 Differentially Private Supervised Learning Algorithms

3.2.1 Differentially Private Naive Bayes Classification

3.2.2 Differentially Private Logistic Regression

3.2.3 Differentially Private Linear Regression

3.3 Differentially Private Unsupervised Learning Algorithms

3.3.1 Differentially Private K-means Clustering

3.4 Case Study: Differentially Private Principal Component Analysis

3.4.1 The Privacy of PCA Over Horizontally Partitioned Data

3.4.2 The Design of Differentially Private PCA Over Horizontally Partitioned Data

3.4.3 Experimentally Evaluating the Performance of the Protocol

3.5 Summary

sitemap