2023
DOI: 10.56553/popets-2023-0031
|View full text |Cite
|
Sign up to set email alerts
|

Private Multi-Winner Voting for Machine Learning

Abstract: Private multi-winner voting is the task of revealing k-hot binary vectors satisfying a bounded differential privacy (DP) guarantee. This task has been understudied in machine learning literature despite its prevalence in many domains such as healthcare. We propose three new DP multi-winner mechanisms: Binary, Tau, and Powerset voting. Binary voting operates independently per label through composition. Tau voting bounds votes optimally in their L2 norm for tight data-independent guarantees. Powerset voting oper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…The Thirty-Eighth AAAI Conference on Artificial Intelligence defense Kariyappa, Prakash, and Qureshi 2020;Dziedzic et al 2021), which performs detection on each sample. Existing solutions can be mainly divided into the following two types: Outlier Exposure (OE).…”
Section: Model Extraction Attack Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The Thirty-Eighth AAAI Conference on Artificial Intelligence defense Kariyappa, Prakash, and Qureshi 2020;Dziedzic et al 2021), which performs detection on each sample. Existing solutions can be mainly divided into the following two types: Outlier Exposure (OE).…”
Section: Model Extraction Attack Detectionmentioning
confidence: 99%
“…Since this method has no explicit anomaly score, we compute the score based on the consensus among these diverse models, and it is smaller when models agree. This idea is also used in previous work (Dziedzic et al 2021).…”
Section: Model Extraction Attack Detectionmentioning
confidence: 99%
“…Model extraction defences try to either detect (Juuti et al 2019;Atli et al 2020;Quiring, Arp, and Rieck 2018) or slow down (Orekondy, Schiele, and Fritz 2020;Dziedzic et al 2022;Lee et al 2018) the attack but cannot prevent it. Adversarial watermarking (Szyller et al 2021) can deter extraction attacks by forcing a watermark into F A , or by ensuring that a watermark transfers from F V to F A (Jia et al 2021).…”
Section: Ownership Verificationmentioning
confidence: 99%