Intrusion detection based on privacy-preserving federated learning for the industrial IoT
Federated learning (FL) has attracted significant interest given its prominent advantages and
applicability in many scenarios. However, it has been demonstrated that sharing updated …
applicability in many scenarios. However, it has been demonstrated that sharing updated …
Local differential privacy for regret minimization in reinforcement learning
Reinforcement learning algorithms are widely used in domains where it is desirable to
provide a personalized service. In these domains it is common that user data contains …
provide a personalized service. In these domains it is common that user data contains …
Program Analysis for Adaptive Data Analysis
Data analyses are usually designed to identify some property of the population from which
the data are drawn, generalizing beyond the specific data sample. For this reason, data …
the data are drawn, generalizing beyond the specific data sample. For this reason, data …
Subsampling suffices for adaptive data analysis
G Blanc - Proceedings of the 55th Annual ACM Symposium on …, 2023 - dl.acm.org
Ensuring that analyses performed on a dataset are representative of the entire population is
one of the central problems in statistics. Most classical techniques assume that the dataset is …
one of the central problems in statistics. Most classical techniques assume that the dataset is …
Generalized private selection and testing with high confidence
Composition theorems are general and powerful tools that facilitate privacy accounting
across multiple data accesses from per-access privacy bounds. However they often result in …
across multiple data accesses from per-access privacy bounds. However they often result in …
Adaptive data analysis in a balanced adversarial model
In adaptive data analysis, a mechanism gets $ n $ iid samples from an unknown distribution
$\cal {D} $, andis required to provide accurate estimations to a sequence of adaptively …
$\cal {D} $, andis required to provide accurate estimations to a sequence of adaptively …
Differentially private all-pairs shortest path distances: Improved algorithms and lower bounds
We study the problem of releasing the weights of all-pairs shortest paths in a weighted
undirected graph with differential privacy (DP). In this setting, the underlying graph is fixed …
undirected graph with differential privacy (DP). In this setting, the underlying graph is fixed …
Privacy Amplification for the Gaussian Mechanism via Bounded Support
Data-dependent privacy accounting frameworks such as per-instance differential privacy
(pDP) and Fisher information loss (FIL) confer fine-grained privacy guarantees for …
(pDP) and Fisher information loss (FIL) confer fine-grained privacy guarantees for …
On avoiding the union bound when answering multiple differentially private queries
In this work, we study the problem of answering $ k $ queries with $(\epsilon,\delta) $-
differential privacy, where each query has sensitivity one. We give an algorithm for this task …
differential privacy, where each query has sensitivity one. We give an algorithm for this task …
Certified private data release for sparse Lipschitz functions
As machine learning has become more relevant for everyday applications, a natural
requirement is the protection of the privacy of the training data. When the relevant learning …
requirement is the protection of the privacy of the training data. When the relevant learning …