2014
DOI: 10.48550/arxiv.1412.7584
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Differential Privacy and Machine Learning: a Survey and Review

Abstract: The objective of machine learning is to extract useful information from data, while privacy is preserved by concealing information. Thus it seems hard to reconcile these competing interests. However, they frequently must be balanced when mining sensitive data. For example, medical research represents an important application where it is necessary both to extract useful information and protect patient privacy. One way to resolve the conflict is to extract general characteristics of whole populations without dis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
57
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(57 citation statements)
references
References 50 publications
0
57
0
Order By: Relevance
“…Privacy is a significant concern in all systems where the use of personal data has significant social and economic impact [29]. Concerns over privacy in AI systems are particularly prevalent, with the high volume of data used for sensitive decisions, such as advertisement, surveillance, health-care decisions, and money lending [14].…”
Section: Privacymentioning
confidence: 99%
“…Privacy is a significant concern in all systems where the use of personal data has significant social and economic impact [29]. Concerns over privacy in AI systems are particularly prevalent, with the high volume of data used for sensitive decisions, such as advertisement, surveillance, health-care decisions, and money lending [14].…”
Section: Privacymentioning
confidence: 99%
“…One possible choice to achieve a high quality analysis avoiding the difficulties of the centralized analysis is usage of privacy-preserving computation. There are two typical types of the privacy-preserving computation techniques based on cryptography [3,8,12,15] and differential privacy [1,4,13].…”
Section: Related Workmentioning
confidence: 99%
“…Examples to overcome the difficulties of the centralized analysis include usage of privacypreserving computation based on cryptography [3,8,12,15] and differential privacy [1,4,13]. The federated learning [16,18], that centralizes a model while the original datasets remains distributed has also been studied for this context.…”
Section: Introductionmentioning
confidence: 99%
“…Differential privacy (DP) [20] provides a rigorous privacy guarantee for data release and has become the state-of-the-art method for designing privacy-preserving ML algorithms [28]. Recently, DP has been applied to the iterative training of DNNs using stochastic gradient descent (DP-SGD) [1] and the FL algorithm of federated averaging (DP-FedAvg) [47], which have achieved competitive performances (utility) with a strong privacy guarantee.…”
Section: Introductionmentioning
confidence: 99%