pith. the verified trust layer for science. sign in

arxiv: 1809.08911 · v2 · pith:EWNCYNCTnew · submitted 2018-09-21 · 💻 cs.LG · cs.CY· cs.SY· eess.SP· stat.ML

Understanding Compressive Adversarial Privacy

classification 💻 cs.LG cs.CYcs.SYeess.SPstat.ML
keywords dataprivacyadversarialcompressivemechanismattackerframeworkreleasing
0
0 comments X p. Extension
Add this Pith Number to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{EWNCYNCT}

Prints a linked pith:EWNCYNCT badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

Designing a data sharing mechanism without sacrificing too much privacy can be considered as a game between data holders and malicious attackers. This paper describes a compressive adversarial privacy framework that captures the trade-off between the data privacy and utility. We characterize the optimal data releasing mechanism through convex optimization when assuming that both the data holder and attacker can only modify the data using linear transformations. We then build a more realistic data releasing mechanism that can rely on a nonlinear compression model while the attacker uses a neural network. We demonstrate in a series of empirical applications that this framework, consisting of compressive adversarial privacy, can preserve sensitive information.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.