Privacy-Preserving Restricted Boltzmann Machine

被引:0
作者
Li, Yu [1 ]
Zhang, Yuan [2 ,3 ]
Ji, Yue [4 ]
机构
[1] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210046, Jiangsu, Peoples R China
[3] Nanjing Univ, Comp Sci & Technol Dept, Nanjing 210046, Jiangsu, Peoples R China
[4] Nanjing Normal Univ, Nanjing 210097, Jiangsu, Peoples R China
关键词
D O I
10.1155/2014/138498
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model.
引用
收藏
页数:7
相关论文
共 22 条
  • [1] ACKLEY DH, 1985, COGNITIVE SCI, V9, P147
  • [2] Aggarwal CC, 2004, LECT NOTES COMPUT SC, V2992, P183
  • [3] Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
  • [4] [Anonymous], P OD SPEAK LANG REC
  • [5] [Anonymous], 2009, NIPS WORKSH DEEP LEA
  • [6] [Anonymous], 2007, P 24 INT C MACHINE L
  • [7] Learning Deep Architectures for AI
    Bengio, Yoshua
    [J]. FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2009, 2 (01): : 1 - 127
  • [8] Privacy-Preserving Backpropagation Neural Network Learning
    Chen, Tingting
    Zhong, Sheng
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 2009, 20 (10): : 1554 - 1564
  • [9] Du W., 2003, P 9 ACM SIGKDD INT C, P505
  • [10] A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS
    ELGAMAL, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) : 469 - 472