Splintering with distributions: A stochastic decoy scheme for private computation

P Vepakomma, J Balla, R Raskar - arXiv preprint arXiv:2007.02719, 2020 - arxiv.org
Performing computations while maintaining privacy is an important problem in todays
distributed machine learning solutions. Consider the following two set ups between a client …

[PDF][PDF] Splintering with distributions and polytopes: Unconventional schemes for private computation

P Vepakomma, J Balla, S Pal… - IEEE EMBS Grand …, 2020 - academia.edu
Performing computations while maintaining privacy is an important problem in todays
distributed machine learning solutions. Consider the following two set ups between a client …

Privacy amplification via bernoulli sampling

J Imola, K Chaudhuri - arXiv preprint arXiv:2105.10594, 2021 - arxiv.org
Balancing privacy and accuracy is a major challenge in designing differentially private
machine learning algorithms. One way to improve this tradeoff for free is to leverage the …

Almost tight error bounds on differentially private continual counting

M Henzinger, J Upadhyay, S Upadhyay - … of the 2023 Annual ACM-SIAM …, 2023 - SIAM
The first large-scale deployment of private federated learning uses differentially private
counting in the continual release model as a subroutine (Google AI blog titled “Federated …

Differential secrecy for distributed data and applications to robust differentially secure vector summation

K Talwar - arXiv preprint arXiv:2202.10618, 2022 - arxiv.org
Computing the noisy sum of real-valued vectors is an important primitive in differentially
private learning and statistics. In private federated learning applications, these vectors are …

Private inference in quantized models

Z Deng, V Ramkumar, R Bitar, N Raviv - arXiv preprint arXiv:2311.13686, 2023 - arxiv.org
A typical setup in many machine learning scenarios involves a server that holds a model
and a user that possesses data, and the challenge is to perform inference while …

Algorithmically effective differentially private synthetic data

Y He, R Vershynin, Y Zhu - The Thirty Sixth Annual …, 2023 - proceedings.mlr.press
We present a highly effective algorithmic approach for generating $\varepsilon $-
differentially private synthetic data in a bounded metric space with near-optimal utility …

Poission subsampled rényi differential privacy

Y Zhu, YX Wang - International Conference on Machine …, 2019 - proceedings.mlr.press
We consider the problem of privacy-amplification by under the Renyi Differential Privacy
framework. This is the main technique underlying the moments accountants (Abadi et al …

A decentralized and robust protocol for private averaging over highly distributed data

P Dellenbach, J Ramon, A Bellet - NIPS 2016 workshop on Private …, 2016 - inria.hal.science
We propose a decentralized protocol for a large set of users to privately compute averages
over their joint data, which can later be used to learn more complex models. Our protocol …

A practical scheme for two-party private linear least squares

M Nassar - arXiv preprint arXiv:1901.09281, 2019 - arxiv.org
Privacy-preserving machine learning is learning from sensitive datasets that are typically
distributed across multiple data owners. Private machine learning is a remarkable challenge …