Privacy is a major issue in learning from distributed data. Recently the cryptographic literature has provided several tools for this task. However, these tools either reduce the quality/accuracy of the learning algorithm-e.g., by adding noise-or they incur a high performance penalty and/or involve trusting external authorities.We propose a methodology for private distributed machine learning from light-weight cryptography (in short, PD-ML-Lite). We apply our methodology to two major ML algorithms, namely non-negative matrix factorization (NMF) and singular value decomposition (SVD). Our resulting protocols are communication optimal, achieve the same accuracy as their non-private counterparts, and satisfy a notion of privacy-which we define-that is both intuitive and measurable. Our approach is to use lightweight cryptographic protocols (secure sum and normalized secure sum) to build learning algorithms rather than wrap complex learning algorithms in a heavy-cost MPC framework.We showcase our algorithms' utility and privacy on several applications: for NMF we consider topic modeling and recommender systems, and for SVD, principal component regression, and low rank approximation. * Bloomberg LP,
We introduce the history sensitive cascade model, a model of information cascade through a network over time. We consider the 'activation' problem of finding the probability of a particular node receiving information given that some nodes are initially informed. Finally, we prove that selecting a set of k nodes with greatest expected influence is NP-hard, and use results from submodular functions to provide a greedy approximation algorithm with a 1 − 1/e − lower bound, where depends polynomially on the precision of the solution to the 'activation' problem. We perform experiments in order to compare the greedy algorithm to three other approximation algorithms.
We introduce the history sensitive cascade model, a model of information cascade through a network over time. We consider the 'activation' problem of finding the probability of a particular node receiving information given that some nodes are initially informed. Finally, we prove that selecting a set of k nodes with greatest expected influence is NP-hard, and use results from submodular functions to provide a greedy approximation algorithm with a 1 − 1/e − lower bound, where depends polynomially on the precision of the solution to the 'activation' problem. We perform experiments in order to compare the greedy algorithm to three other approximation algorithms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.