当前位置:网站首页>Differential privacy
Differential privacy
2022-06-24 15:14:00 【403 Forbidden】
Lecture 22: Differential privacy
-for differential privacy, understand what information is being protected and what information is not being protected
What information is being protected
- feels safe their are not much difference whether or not I take part in the survey
-understand how to compute the global sensitivity G of counting queries
Global sensitivity of a query Q is the maximum difference in
answers that adding or removing any individual from the dataset
can cause (maximum effect of an individual)
• Intuitively, we want to consider the worst case scenario
• If asking multiple queries, global sensitivity is equal to the sum
of the differences
Global sensitivity (G)
- How much difference the presence or absence of an indivual could make to the result
- can be calculated by look at the datasets
-understand the role of the privacy loss budget k
Privacy budget (K)
- how private we want the result to be (how hard for the attacker to guess the true result)
- A is the probability that result is R with me, B is the probability that results R without me. Choses k to gearantee that A <= 2^k * B
- k=0 No privacy loss, low utility
- k=hgih: larger privacy loss, high utility
- k=low: low privacy loss, lower utility
-understand the role of G and k in terms of how much noise is added to the true query result
how much to add
- depending on G/k, that is, large G and small k allows more noise to be added.
- but the average value of the noise is 0
-understand that noise is added to the real query answer and this noise-added result is what will be released to the user. Understand how this protects the privacy of an individual
-understand that the amount of noise added is dependent on the ratio G/k. Larger G allows for more noise to be added and smaller k allows for more noise added
边栏推荐
- I have been in the industry for 4 years and have changed jobs twice. I have learned a lot about software testing
- R语言构建回归模型诊断(正态性无效)、进行变量变换、使用car包中的powerTransform函数对目标变量进行Box-Cox变换(Box–Cox transform to normality)
- Daily knowledge popularization
- 六月集训(第23天) —— 字典树
- How to implement redis cache of highly paid programmers & interview questions series 115? How do I find a hot key? What are the possible problems with caching?
- Record the range of data that MySQL update will lock
- postgresql之List
- 一个简单而功能强大的开发者工具箱Box3.cc
- 测试 H5 和小程序的区别,你真的知道吗?
- IList of PostgreSQL
猜你喜欢

入行 4 年,跳槽 2 次,我摸透了软件测试这一行

Common singleton mode & simple factory

CVPR 2022 - Interpretation of selected papers of meituan technical team
![[bitbear story collection] June MVP hero story | technology practice collision realm thinking](/img/b7/ca2f8cfb124e7c68da0293624911d1.png)
[bitbear story collection] June MVP hero story | technology practice collision realm thinking

Data sharing between laravel lower views

Daily knowledge popularization
Record the range of data that MySQL update will lock
Step by step introduction to sqlsugar based development framework (9) -- Realizing field permission control with WinForm control

As a developer, what is the most influential book for you?

From pair to unordered_ Map, theory +leetcode topic practice
随机推荐
Stm32f1 and stm32cubeide programming examples -ws2812b full color LED driver (based on spi+dma)
CVPR2022 | 可精简域适应
Which securities company is better and safer for great wisdom to choose when opening an account
FPGA based analog I ² C protocol system design (Part I)
[bitbear story collection] June MVP hero story | technology practice collision realm thinking
How to resolve the 35 year old crisis? Sharing of 20 years' technical experience of chief architect of Huawei cloud database
实战 | 记一次曲折的钓鱼溯源反制
R language constructs regression model diagnosis (normality is invalid), performs variable transformation, and uses powertransform function in car package to perform box Cox transform to normality on
The industrial control security of roaming the Intranet
Go language -init() function - package initialization
[pytoch] quantification
Detailed explanation of redis data types
Bitmap of redis data structure
MySQL title
The security market has entered a trillion era, and the security B2B online mall system has been accurately connected to deepen the enterprise development path
怎样评价国产报表工具和BI软件
Esp32 series -- comparison of esp32 series
Keyword of ES mapping; Term query add keyword query; Change mapping keyword type
Step by step introduction to sqlsugar based development framework (9) -- Realizing field permission control with WinForm control
Qunhui synchronizes with alicloud OSS