Differential Privacy in HyperNetworks for Personalized Federated Learning

被引:2
作者
Nemala, Vaisnavi [1 ]
Phung Lai [2 ]
NhatHai Phan [1 ]
机构
[1] New Jersey Inst Technol, Newark, NJ 07102 USA
[2] SUNY Albany, Albany, NY 12222 USA
来源
PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023 | 2023年
基金
美国国家科学基金会;
关键词
Federated Learning; Differential Privacy; Hypernetworks;
D O I
10.1145/3583780.3615203
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Federated learning (FL) is a framework for collaborative learning among users through a coordinating server. Arecent HyperNetwork-based personalized FL framework, called HyperNetFL, is used to generate local models using personalized descriptors optimized for each user independently. However, HyperNetFL introduces unknown privacy risks. This paper introduces a novel approach to preserve user-level differential privacy, dubbed User-level DP, by providing formal privacy protection for data owners in training a HyperNetFL model. To achieve that, our proposed algorithm, called UDP-Alg, optimizes the trade-off between privacy loss and model utility by tightening sensitivity bounds. An intensive evaluation using benchmark datasets shows that our proposed UDP-Alg significantly improves privacy protection at a modest cost in utility.
引用
收藏
页码:4224 / 4228
页数:5
相关论文
共 29 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
[Anonymous], 2016, Hypernetworks
[3]  
[Anonymous], 2021, ICML
[4]  
[Anonymous], 2022, CVPR, DOI DOI 10.1109/CVPR52688.2022.00987
[5]  
[Anonymous], 2020, ICML
[6]  
[Anonymous], 2021, ICML
[7]  
Asi Hilal, 2019, ARXIV191204042
[8]  
Caldas S., 2018, ARXIV
[9]  
Dinh CT, 2020, ADV NEUR IN, V33
[10]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284