Intrusion detection based on privacy-preserving federated learning for the industrial IoT

P Ruzafa-Alcázar, P Fernández-Saura… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Federated learning (FL) has attracted significant interest given its prominent advantages and
applicability in many scenarios. However, it has been demonstrated that sharing updated …

Local differential privacy for regret minimization in reinforcement learning

E Garcelon, V Perchet… - Advances in Neural …, 2021 - proceedings.neurips.cc
Reinforcement learning algorithms are widely used in domains where it is desirable to
provide a personalized service. In these domains it is common that user data contains …

Program Analysis for Adaptive Data Analysis

J Liu, W Qu, M Gaboardi, D Garg, J Ullman - Proceedings of the ACM on …, 2024 - dl.acm.org
Data analyses are usually designed to identify some property of the population from which
the data are drawn, generalizing beyond the specific data sample. For this reason, data …

Subsampling suffices for adaptive data analysis

G Blanc - Proceedings of the 55th Annual ACM Symposium on …, 2023 - dl.acm.org
Ensuring that analyses performed on a dataset are representative of the entire population is
one of the central problems in statistics. Most classical techniques assume that the dataset is …

Generalized private selection and testing with high confidence

E Cohen, X Lyu, J Nelson, T Sarlós… - arxiv preprint arxiv …, 2022 - arxiv.org
Composition theorems are general and powerful tools that facilitate privacy accounting
across multiple data accesses from per-access privacy bounds. However they often result in …

Adaptive data analysis in a balanced adversarial model

K Nissim, U Stemmer, E Tsfadia - Advances in Neural …, 2023 - proceedings.neurips.cc
In adaptive data analysis, a mechanism gets $ n $ iid samples from an unknown distribution
$\cal {D} $, andis required to provide accurate estimations to a sequence of adaptively …

Differentially private all-pairs shortest path distances: Improved algorithms and lower bounds

JY Chen, B Ghazi, R Kumar, P Manurangsi… - Proceedings of the 2023 …, 2023 - SIAM
We study the problem of releasing the weights of all-pairs shortest paths in a weighted
undirected graph with differential privacy (DP). In this setting, the underlying graph is fixed …

Privacy Amplification for the Gaussian Mechanism via Bounded Support

S Hu, S Mahloujifar, V Smith, K Chaudhuri… - arxiv preprint arxiv …, 2024 - arxiv.org
Data-dependent privacy accounting frameworks such as per-instance differential privacy
(pDP) and Fisher information loss (FIL) confer fine-grained privacy guarantees for …

On avoiding the union bound when answering multiple differentially private queries

B Ghazi, R Kumar… - Conference on Learning …, 2021 - proceedings.mlr.press
In this work, we study the problem of answering $ k $ queries with $(\epsilon,\delta) $-
differential privacy, where each query has sensitivity one. We give an algorithm for this task …

Certified private data release for sparse Lipschitz functions

K Donhauser, J Lokna, A Sanyal… - International …, 2024 - proceedings.mlr.press
As machine learning has become more relevant for everyday applications, a natural
requirement is the protection of the privacy of the training data. When the relevant learning …