Private classification with limited labeled data

被引:9
作者
Liu, Xiaoqian [1 ]
Li, Qianmu [1 ]
Li, Tao [2 ,3 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Jiangsu BDSIP Key Lab, Nanjing 210023, Jiangsu, Peoples R China
[3] Florida Int Univ, Sch Comp & Informat Sci, Miami, FL 33199 USA
关键词
Unlabeled data; TSVM; Differential privacy; Exponential mechanism; NOISE;
D O I
10.1016/j.knosys.2017.07.006
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Differentially private Support Vector Machines (SVMs) have been extensively studied in recent years. Most design mechanisms are focused on perturbing the solution to a decent convex optimization problem under the theory of Empirical Risk Minimization (ERM). To preserve the accuracy, a large number of labeled data is needed for training the model. However, in most cases, the labeled data is limited. Constructing private SVMs in such cases often suffers from low accuracy. The situation gets worse if the given privacy budget is small. In this paper, we make use of Transductive Support Vector Machines (TSVMs) to learn from the unlabeled data. Through minimizing the overall loss on both labeled and unlabeled data, we generate a label assignment pool. Each label assignment in the pool is first evaluated as an output candidate, then selected with uncertainty for privacy consideration. The proposed algorithm provides high classification accuracy, when the labeled data is limited and when the privacy budget is small, under differential privacy. Extensive experiments show the effectiveness of the proposed algorithm on both real datasets and synthetic datasets. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:197 / 207
页数:11
相关论文
共 36 条
[1]   Broad patterns of gene expression revealed by clustering analysis of tumor and normal colon tissues probed by oligonucleotide arrays [J].
Alon, U ;
Barkai, N ;
Notterman, DA ;
Gish, K ;
Ybarra, S ;
Mack, D ;
Levine, AJ .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 1999, 96 (12) :6745-6750
[2]   Hierarchical anonymization algorithms against background knowledge attack in data releasing [J].
Amiri, Fatemeh ;
Yazdani, Nasser ;
Shakery, Azadeh ;
Chinaei, Amir H. .
KNOWLEDGE-BASED SYSTEMS, 2016, 101 :71-89
[3]  
[Anonymous], ARXIV150206309
[4]  
[Anonymous], BIOMED RES INT
[5]   Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds [J].
Bassily, Raef ;
Smith, Adam ;
Thakurta, Abhradeep .
2014 55TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2014), 2014, :464-473
[6]  
Beimel Amos, 2015, P 26 ANN ACM SIAM S, P461
[7]  
Bezdek J. C., 2003, Neural, Parallel & Scientific Computations, V11, P351
[8]  
Blum A., 2005, PODS'05: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, P128, DOI DOI 10.1145/1065167.1065184
[9]  
Boser B. E., 1992, Proceedings of the Fifth Annual ACM Workshop on Computational Learning Theory, P144, DOI 10.1145/130385.130401
[10]  
Chapelle O, 2008, J MACH LEARN RES, V9, P203