Renyi Differentially Private ADMM for Non-Smooth Regularized Optimization

被引:2
作者
Chen, Chen [1 ]
Lee, Jaewoo [1 ]
机构
[1] Univ Georgia, Athens, GA 30602 USA
来源
PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020 | 2020年
关键词
differential privacy; convex optimization; ADMM; regularization; VARIABLE SELECTION; NOISE; PATH;
D O I
10.1145/3374664.3375733
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we consider the problem of minimizing composite objective functions consisting of a convex differentiable loss function plus a non-smooth regularization term, such as L-1 norm or nuclear norm, under Renyi differential privacy (RDP). To solve the problem, we propose two stochastic alternating direction method of multipliers (ADMM) algorithms: ssADMM based on gradient perturbation and mpADMM based on output perturbation. Both algorithms decompose the original problem into sub-problems that have closed-form solutions. The first algorithm, ssADMM, applies the recent privacy amplification result for RDP to reduce the amount of noise to add. The second algorithm, mpADMM, numerically computes the sensitivity of ADMM variable updates and releases the updated parameter vector at the end of each epoch. We compare the performance of our algorithms with several baseline algorithms on both real and simulated datasets. Experimental results show that, in high privacy regimes (small.), ssADMM and mpADMM outperform baseline algorithms in terms of classification and feature selection performance, respectively.
引用
收藏
页码:319 / 328
页数:10
相关论文
共 44 条
[21]   DP-ADMM: ADMM-Based Distributed Learning With Differential Privacy [J].
Huang, Zonghao ;
Hu, Rui ;
Guo, Yuanxiong ;
Chan-Tin, Eric ;
Gong, Yanmin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1002-1012
[22]  
Kifer Daniel, 2012, C LEARNING THEORY, P25
[23]  
Koskela A., 2018, arXiv
[24]  
Lee S., 2006, P 21 NATL C ARTIFICI
[25]   Blessing of Dimensionality: Recovering Mixture Data via Dictionary Pursuit [J].
Liu, Guangcan ;
Liu, Qingshan ;
Li, Ping .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2017, 39 (01) :47-60
[26]   Renyi Differential Privacy [J].
Mironov, Ilya .
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, :263-275
[27]  
Ng A. Y., 2004, P 21 INT C MACH LEAR, P78, DOI DOI 10.1145/1015330.1015435
[28]  
Ouyang H, 2013, INT C MACH LEARN, P80
[29]   L1-regularization path algorithm for generalized linear models [J].
Park, Mee Young ;
Hastie, Trevor .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-STATISTICAL METHODOLOGY, 2007, 69 :659-677
[30]   The Bayesian Lasso [J].
Park, Trevor ;
Casella, George .
JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 2008, 103 (482) :681-686