当前位置:网站首页>Differential privacy
Differential privacy
2022-06-24 15:14:00 【403 Forbidden】
Lecture 22: Differential privacy
-for differential privacy, understand what information is being protected and what information is not being protected
What information is being protected
- feels safe their are not much difference whether or not I take part in the survey
-understand how to compute the global sensitivity G of counting queries
Global sensitivity of a query Q is the maximum difference in
answers that adding or removing any individual from the dataset
can cause (maximum effect of an individual)
• Intuitively, we want to consider the worst case scenario
• If asking multiple queries, global sensitivity is equal to the sum
of the differences
Global sensitivity (G)
- How much difference the presence or absence of an indivual could make to the result
- can be calculated by look at the datasets
-understand the role of the privacy loss budget k
Privacy budget (K)
- how private we want the result to be (how hard for the attacker to guess the true result)
- A is the probability that result is R with me, B is the probability that results R without me. Choses k to gearantee that A <= 2^k * B
- k=0 No privacy loss, low utility
- k=hgih: larger privacy loss, high utility
- k=low: low privacy loss, lower utility
-understand the role of G and k in terms of how much noise is added to the true query result
how much to add
- depending on G/k, that is, large G and small k allows more noise to be added.
- but the average value of the noise is 0
-understand that noise is added to the real query answer and this noise-added result is what will be released to the user. Understand how this protects the privacy of an individual
-understand that the amount of noise added is dependent on the ratio G/k. Larger G allows for more noise to be added and smaller k allows for more noise added
边栏推荐
- 六石管理学:垃圾场效应:工作不管理,就会变成垃圾场
- C language ---18 function (user-defined function)
- 股票开户要找谁?在线开户安全么?
- 六月集训(第23天) —— 字典树
- SSH keygen configuration does not require entering a password every time
- Qunhui synchronizes with alicloud OSS
- 安防市场进入万亿时代,安防B2B网上商城系统精准对接深化企业发展路径
- leetcode.12 --- 整数转罗马数字
- 不要小看了积分商城,它的作用可以很大
- postgresql之List
猜你喜欢
Oracle RAC configuration multipathing

测试 H5 和小程序的区别,你真的知道吗?

I have been in the industry for 4 years and have changed jobs twice. I have learned a lot about software testing

postgresql之词法分析简介

动作捕捉系统用于地下隧道移动机器人定位与建图

`Thymeleaf ` template engine comprehensive analysis

He is also a junior test engineer. Why is his salary high? The interview must be brilliant at these points

Common sense knowledge points

Keras深度学习实战(11)——可视化神经网络中间层输出
Step by step introduction to sqlsugar based development framework (9) -- Realizing field permission control with WinForm control
随机推荐
Py之toad:toad的简介、安装、使用方法之详细攻略
VIM common shortcut keys
Redis interview questions
How to avoid placing duplicate orders
Esp32 series -- comparison of esp32 series
Step by step introduction to sqlsugar based development framework (9) -- Realizing field permission control with WinForm control
Linux Installation cenos7 MySQL - 8.0.26
证券账户理财安全吗??
R language constructs regression model diagnosis (normality is invalid), performs variable transformation, and uses powertransform function in car package to perform box Cox transform to normality on
Don't underestimate the integral mall. It can play a great role
postgresql之List
Daily knowledge popularization
postgresql之词法分析简介
Explore cloud native databases and take a broad view of future technological development
成功解决:selenium.common.exceptions.SessionNotCreatedException: Message: session not created: This versi
Istio Troubleshooting: using istio to reserve ports causes pod startup failure
leetcode 139. Word break word split (medium)
Concurrent writing of maps in golang
50 practical applications of R language (23) - important concepts of Bayesian Theory: credibility, model models, and parameters
openinstall携手书链:助力渠道数据分析,共创书联网时代