Using Noisy Binary Search for Differentially Private Anomaly Detection

被引:6
作者
Bittner, Daniel M. [1 ]
Sarwate, Anand D. [2 ]
Wright, Rebecca N. [1 ,3 ]
机构
[1] Rutgers State Univ, Dept Comp Sci, Piscataway, NJ 08854 USA
[2] Rutgers State Univ, Dept Elect & Comp Engn, Piscataway, NJ USA
[3] Rutgers State Univ, DIMACS, Piscataway, NJ USA
来源
CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2018 | 2018年 / 10879卷
关键词
D O I
10.1007/978-3-319-94147-9_3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we study differential privacy in noisy search. This problem is connected to noisy group testing: the goal is to find a defective or anomalous item within a group using only aggregate group queries, not individual queries. Differentially private noisy group testing has the potential to be used for anomaly detection in a way that provides differential privacy to the non-anomalous individuals while still helping to allow the anomalous individuals to be located. To do this, we introduce the notion of anomaly-restricted differential privacy. We then show that noisy group testing can be used to satisfy anomaly-restricted differential privacy while still narrowing down the location of the anomalous samples, and evaluate our approach experimentally.
引用
收藏
页码:20 / 37
页数:18
相关论文
共 38 条
  • [1] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [2] A comprehensive survey of numeric and symbolic outlier mining techniques
    Agyemang, Malik
    Barker, Ken
    Alhajj, Rada
    [J]. INTELLIGENT DATA ANALYSIS, 2006, 10 (06) : 521 - 538
  • [3] Boolean Compressed Sensing and Noisy Group Testing
    Atia, George K.
    Saligrama, Venkatesh
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (03) : 1880 - 1901
  • [4] The Bayesian Learner is Optimal for Noisy Binary Search (and Pretty Good for Quantum as Well)
    Ben Or, Michael
    Hassidim, Avinatan
    [J]. Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008, : 221 - 230
  • [5] RANDOM MULTIPLE-ACCESS COMMUNICATION AND GROUP-TESTING
    BERGER, T
    MEHRAVARI, N
    TOWSLEY, D
    WOLF, J
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1984, 32 (07) : 769 - 779
  • [6] Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
    Bun, Mark
    Steinke, Thomas
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 635 - 658
  • [7] Burnashev M. V., 1974, Problems of Information Transmission, V10, P223
  • [8] Cai S, 2013, Arxiv, DOI arXiv:1307.2811
  • [9] Construction of a Large Class of Deterministic Sensing Matrices That Satisfy a Statistical Isometry Property
    Calderbank, Robert
    Howard, Stephen
    Jafarpour, Sina
    [J]. IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2010, 4 (02) : 358 - 374
  • [10] Non-adaptive Group Testing: Explicit Bounds and Novel Algorithms
    Chan, Chun Lam
    Jaggi, Sidharth
    Saligrama, Venkatesh
    Agnihotri, Samar
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (05) : 3019 - 3035