当前位置:网站首页>Differential privacy
Differential privacy
2022-06-24 15:14:00 【403 Forbidden】
Lecture 22: Differential privacy
-for differential privacy, understand what information is being protected and what information is not being protected
What information is being protected
- feels safe their are not much difference whether or not I take part in the survey
-understand how to compute the global sensitivity G of counting queries
Global sensitivity of a query Q is the maximum difference in
answers that adding or removing any individual from the dataset
can cause (maximum effect of an individual)
• Intuitively, we want to consider the worst case scenario
• If asking multiple queries, global sensitivity is equal to the sum
of the differences
Global sensitivity (G)
- How much difference the presence or absence of an indivual could make to the result
- can be calculated by look at the datasets
-understand the role of the privacy loss budget k
Privacy budget (K)
- how private we want the result to be (how hard for the attacker to guess the true result)
- A is the probability that result is R with me, B is the probability that results R without me. Choses k to gearantee that A <= 2^k * B
- k=0 No privacy loss, low utility
- k=hgih: larger privacy loss, high utility
- k=low: low privacy loss, lower utility
-understand the role of G and k in terms of how much noise is added to the true query result
how much to add
- depending on G/k, that is, large G and small k allows more noise to be added.
- but the average value of the noise is 0
-understand that noise is added to the real query answer and this noise-added result is what will be released to the user. Understand how this protects the privacy of an individual
-understand that the amount of noise added is dependent on the ratio G/k. Larger G allows for more noise to be added and smaller k allows for more noise added
边栏推荐
- 作为一名开发者,对你影响最深的书籍是哪一本?
- How do individuals open accounts for stock speculation? Is it safe to open accounts for stock speculation
- CVPR2022 | 可精简域适应
- 成功解决:selenium.common.exceptions.SessionNotCreatedException: Message: session not created: This versi
- Actual combat | a tortuous fishing counteraction
- MySQL title
- Bert whitening vector dimension reduction and its application
- Is industrial securities reliable? Is it safe to open a securities account?
- 09_ An efficient memory method
- Golang实现Biginteger大数计算
猜你喜欢

业务与技术双向结合构建银行数据安全管理体系

Laravel8 uses faker to call factory to fill data

PgSQL queries the largest or smallest data of a field in a group

Daily knowledge popularization

leetcode. 12 --- integer to Roman numeral

A common defect management tool - Zen, which teaches you from installation to using the handle

Multimeter resistance measurement diagram and precautions

Explore cloud native databases and take a broad view of future technological development

测试 H5 和小程序的区别,你真的知道吗?

探索云原生数据库,纵观未来科技发展
随机推荐
Common sense knowledge points
六月集训(第24天) —— 线段树
一个简单而功能强大的开发者工具箱Box3.cc
Overview of SAP marketing cloud functions (IV)
Golang implements BigInteger large number calculation
laravel8使用faker调用工厂填充数据
The industrial control security of roaming the Intranet
leetcode.12 --- 整数转罗马数字
兴业证券靠谱吗?开证券账户安全吗?
Keyword of ES mapping; Term query add keyword query; Change mapping keyword type
Is it safe to open an account in flush? What preparation is needed
Py之toad:toad的简介、安装、使用方法之详细攻略
R语言构建回归模型诊断(正态性无效)、进行变量变换、使用car包中的powerTransform函数对目标变量进行Box-Cox变换(Box–Cox transform to normality)
Go language concurrency model mpg model
The "little giant" specialized in special new products is restarted, and the "enterprise cloud" digital empowerment
Don't underestimate the integral mall. It can play a great role
左手代码,右手开源,开源路上的一份子
测试 H5 和小程序的区别,你真的知道吗?
I have been in the industry for 4 years and have changed jobs twice. I have learned a lot about software testing
In the eyes of the universe, how to correctly care about counting East and West?