2013
DOI: 10.1080/10556788.2012.710615
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving linear and nonlinear approximation via linear programming

Abstract: We propose a novel privacy-preserving random kernel approximation based on a data matrix A ∈ R m×n whose rows are divided into privately owned blocks. Each block of rows belongs to a different entity that is unwilling to share its rows or make them public. We wish to obtain an accurate function approximation for a given y ∈ R m corresponding to each of the m rows of A. Our approximation of y is a real function on R n evaluated at each row of A and is based on the concept of a reduced kernel K(A, B ′ ) where B … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
5
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 15 publications
1
5
0
Order By: Relevance
“…The above equation implies that z 1 = a 11 , z 2 = a 12 due to x 1 (0) = x 2 (0). Similarly, we can show z 3 = a 21 , z 4 = a 22 . This implies that the matrix equations in Theorem 3.1 has a unique solution, which yields a contradiction.…”
Section: A Special Case: Distributed Consensus Algorithmssupporting
confidence: 54%
See 2 more Smart Citations
“…The above equation implies that z 1 = a 11 , z 2 = a 12 due to x 1 (0) = x 2 (0). Similarly, we can show z 3 = a 21 , z 4 = a 22 . This implies that the matrix equations in Theorem 3.1 has a unique solution, which yields a contradiction.…”
Section: A Special Case: Distributed Consensus Algorithmssupporting
confidence: 54%
“…In cryptograph-based methods [27], agents need to encrypt the estimates needed to be shared with their neighbors and decrypt the received estimates so that agents' privacy cannot be disclosed. In differential privacy methods [17,19,21,22,26], agents need to add random noises on the estimates needed to transmitted to protect agents' privacy. Different from them, in our algorithm (9), the estimates can be transmitted directly between neighbors without any additional technique to disguise agents' estimates.…”
Section: Remark 43mentioning
confidence: 99%
See 1 more Smart Citation
“…There have been significant advances in privacy‐aware data analytics (Dreier & Kerschbaum, ; Fung & Mangasarian, ; Sarwate & Chaudhuri, ; Yan et al ., ; Duchi et al ., ; Weeraddana et al ., ; Xie et al ., ; Nozari et al ., ). However, a significant amount of research and development is still needed to devise tools which simultaneously ensure the following: 1) very high degrees of privacy, 2) handling huge data volumes and 3) handling very generic machine learning models or tasks.…”
Section: Big Data Analyticsmentioning
confidence: 99%
“…Naturally, such transformations are sought to be ‘non‐invertible’, in the sense that the adversary cannot (or is very unlikely) to recover private data by observing the messages. For example, Dreier and Kerschbaum () and Fung and Mangasarian () address solving LPs, where each party multiplies its own real‐valued private data vector D i by a privately generated random matrix . The main advantage of the non‐cryptography‐based solutions with respect to the cryptography‐based ones is that data analytics is performed directly over the transformed, but non‐encrypted data (real numbers, vectors and matrices).…”
Section: Big Data Analyticsmentioning
confidence: 99%