Privacy Enhancing Machine Learning via Removal of Unwanted Dependencies

07/30/2020
by   Mert Al, et al.
0

The rapid rise of IoT and Big Data has facilitated copious data driven applications to enhance our quality of life. However, the omnipresent and all-encompassing nature of the data collection can generate privacy concerns. Hence, there is a strong need to develop techniques that ensure the data serve only the intended purposes, giving users control over the information they share. To this end, this paper studies new variants of supervised and adversarial learning methods, which remove the sensitive information in the data before they are sent out for a particular application. The explored methods optimize privacy preserving feature mappings and predictive models simultaneously in an end-to-end fashion. Additionally, the models are built with an emphasis on placing little computational burden on the user side so that the data can be desensitized on device in a cheap manner. Experimental results on mobile sensing and face datasets demonstrate that our models can successfully maintain the utility performances of predictive models while causing sensitive predictions to perform poorly.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/09/2020

Utility-aware Privacy-preserving Data Releasing

In the big data era, more and more cloud-based data-driven applications ...
research
02/26/2017

Ratio Utility and Cost Analysis for Privacy Preserving Subspace Projection

With a rapidly increasing number of devices connected to the internet, b...
research
06/08/2020

Privacy Adversarial Network: Representation Learning for Mobile Data Privacy

The remarkable success of machine learning has fostered a growing number...
research
07/10/2023

Privacy-Preserving Graph Machine Learning from Data to Computation: A Survey

In graph machine learning, data collection, sharing, and analysis often ...
research
07/24/2017

Share your Model instead of your Data: Privacy Preserving Mimic Learning for Ranking

Deep neural networks have become a primary tool for solving problems in ...
research
01/15/2019

Why Johnny Can't Develop Mobile Crowdsourcing Applications with Location Privacy

Mobile crowdsourcing (MCS) relies on users' devices as sensors to perfor...

Please sign up or login with your details

Forgot password? Click here to reset