Differentially private consensus and distributed optimization in multi-agent systems: A review

Y Wang, H Lin, J Lam, KW Kwok - Neurocomputing, 2024‏ - Elsevier
In the past few decades, distributed multi-agent system (MAS) control has received growing
attention due to its numerous advantages. Nonetheless, the substantial reliance on local …

On differentially private federated linear contextual bandits

X Zhou, SR Chowdhury - arxiv preprint arxiv:2302.13945, 2023‏ - arxiv.org
We consider cross-silo federated linear contextual bandit (LCB) problem under differential
privacy, where multiple silos (agents) interact with the local users and communicate via a …

Differentially private distributed resource allocation via deviation tracking

T Ding, S Zhu, C Chen, J Xu… - IEEE Transactions on …, 2021‏ - ieeexplore.ieee.org
This paper studies the distributed resource allocation problem where all the agents
cooperatively minimize the sum of their cost functions. To prevent private information from …

Differentially private reward functions for markov decision processes

A Benvenuti, C Hawkins, B Fallin… - … IEEE Conference on …, 2024‏ - ieeexplore.ieee.org
Markov decision processes often seek to maximize a reward function, but onlookers may
infer reward functions by observing agents, which can reveal sensitive information …

Guaranteed feasibility in differentially private linearly constrained convex optimization

A Benvenuti, B Bialy, M Dennis… - IEEE Control Systems …, 2024‏ - ieeexplore.ieee.org
Convex programming with linear constraints plays an important role in the operation of a
number of everyday systems. However, absent any additional protections, revealing or …

[کتاب][B] Guide to differential privacy modifications: a taxonomy of variants and extensions

B Pejó, D Desfontaines - 2022‏ - books.google.com
Shortly after it was first introduced in 2006, differential privacy became the flagship data
privacy definition. Since then, numerous variants and extensions were proposed to adapt it …

Privacy-preserving set-based estimation using partially homomorphic encryption

A Alanwar, V Gaßmann, X He, H Said… - European Journal of …, 2023‏ - Elsevier
The set-based estimation has gained a lot of attention due to its ability to guarantee state
enclosures for safety-critical systems. However, collecting measurements from distributed …

Lowering the cost of anonymization

D Desfontaines - 2020‏ - research-collection.ethz.ch
The objective of this thesis is to make it easier to understand, use, and deploy strong
anonymization practices. We make progress towards this goal in three ways. First, we make …

Local differential privacy for multi-agent distributed optimal power flow

R Dobbe, Y Pu, J Zhu, K Ramchandran… - 2020 IEEE PES …, 2020‏ - ieeexplore.ieee.org
Real-time data-driven optimization and control problems over networks, such as in traffic or
energy systems, may require sensitive information of participating agents to calculate …

Private computing offloading in edge cloud via collaborative online learning

L Wang, L Yang, M Zhang, J Zhang… - Wireless …, 2022‏ - Wiley Online Library
Computing offloading based on mobile edge computing (MEC) for mobile devices (MDs)
has received great attentions in recent years. Strategy selection is an extremely important …