SlideShare a Scribd company logo
Signal Processing and Data Privacy

Literature Review – Talk
By Kato Mivule
COSC891 Fall 2013

Signal Processing and Machine Learning with Differential Privacy
Algorithms and challenges for continuous data
Sarwate, A.D.; Chaudhuri, K., "Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for
Continuous Data," Signal Processing Magazine, IEEE , vol.30, no.5, pp.86,94, Sept. 2013
doi: 10.1109/MSP.2013.2259911

Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Agenda
•
•
•
•
•
•

Introduction.
Privacy Definition Challenge.
Differential Privacy Definition.
Differential Privacy Challenges.
Differential Privacy Applications in Signal Processing.
Conclusion.

Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Introduction: Privacy Preserving Data Mining
• Maintaining the privacy of individuals is imperative.
• Individuals expect their data to be kept private despite willingness to share
such info.
• The Challenge is how extract knowledge from large scale data while
maintaining privacy.

Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Introduction: Privacy Definition
• Privacy definition is problematic.
• There are different meaning for these words across different communities:
• Privacy
• Confidentiality
• Security
• “There is no real separation between individuals’ identity and their data—the
pattern of data associated with an individual is itself uniquely identifying.”
Sarwate and Chaudhuri (2013)

Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Differential Privacy Definition
• Cryptographically Motivated.
• Proposed by Cynthia Dwork (2006).
• Imposes confidentiality by returning perturbed query responses from
databases:
•

𝒇 𝒙 + 𝑳𝒂𝒑𝒍𝒂𝒄𝒆(𝟎, 𝒃)

•

𝒃=

•

∆𝒇
𝜺

∆𝒇 = 𝑴𝒂𝒙 𝒇 𝑫 𝟏 − 𝒇 𝑫 𝟐

• The end user of the database cannot know if a data item has been altered.
• An attacker cannot gain information about any data item in the database.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Differential Privacy Definition:
ε-differential privacy is satisfied if the results to a query run on database D1 and D2 should
probabilistically be similar, and meet the following condition:


𝑷[𝒒 𝒏 (𝑫 𝟏 )∈𝑹]
𝑷[𝒒 𝒏 𝑫 𝟐 ∈𝑹]

≤ 𝒆𝜺



Where D1 and D2 are the two databases




P is the probability of the perturbed query results D1 and D2.
qn() is the privacy granting procedure (perturbation).




qn(D1) is the privacy granting procedure on query results from database D1.
qn(D2) is the privacy granting procedure on query results from database D2.




R is the perturbed query results from the databases D1 and D2 respectively.
𝒆 𝜺 is the exponential e epsilon value.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Differential Privacy Definition – Types
• Query-based Differential Privacy.
• Input perturbation based differential privacy – add Laplace noise to the data.
• Output perturbation – add Laplace noise to the query results.

Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Differential Privacy – Input and Output Perturbation

Image Source: Sarwate, A.D.; Chaudhuri, K., "Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for
Continuous Data," Signal Processing Magazine, IEEE , vol.30, no.5, pp.86,94, Sept. 2013 doi: 10.1109/MSP.2013.2259911

Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Differential Privacy Challenges
• There is a tension between data privacy and data utility.
• Evaluating the impact of privacy restrictions on utility.
• Data dimensionality.

• Trade-off points between data privacy and utility.

Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Differential Privacy Challenges – Utility Quantification
•

Mean Squared Error – for statistical estimation.
•

•

Computed as follows: Original and privatized datasets 𝑋 − 𝑋 ′
𝑑
𝑗=1

𝑛
′ 2
𝑖=1(𝑥 𝑖𝑗 −𝑥 𝑖𝑗 )

𝑛𝑑

•

Expected loss – for classification.

•

Comparative analysis – quantify various differential privacy algorithms.

•

Where n is the number of records and d the number of variables in the table.

Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Differential Privacy Challenges – Limitations
• Time Series and Filtering problems.
• Understanding the fundamental limits for continuous data may shed some
light on which signal processing tasks are possible under differential privacy.
• The optimal differential privacy parameter adjustment for acceptable levels of
data utility – adjustment of the 𝜺 value.
• A single data set could be used in multiple computations – challenge is how
to keep the same differential privacy across the board.

Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Differential Privacy – Signal Processing Applications
•

Apply differential piracy in signal processing problems.

•

Apply signal processing to the differential privacy problem of data utility.

•

Time Series and Filtering problems.

•

Differential privacy of a query sequence in Fourier domain and use homomorphic
encryption for distributed noise addition.

•

Kalman filtering applied to a differentially private time series.

•

Kalman filtering used on aggregated signals after input and output perturbation.

Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Differential Privacy – Applications
• Integrate differential privacy in signal processing.
• Use signal processing to enhance data utility and privacy.
• Use signal processing to filter out unneeded noise.

• Research areas – applying differential privacy in signal processing for:
•
•
•
•

Image processing
Network information systems
Cryptographic approaches
Social networks

Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Conclusion
•

A general overview of the differential privacy is given.

•

The paper focused on differential privacy and the applications in signal processing.

•

The paper suggests research areas for applying differential privacy in signal
processing.

•

Implementation is left to the readers.

Bowie State University Department of Computer Science
Signal Processing and Data Privacy

References
•

Sarwate, A.D.; Chaudhuri, K., "Signal Processing and Machine Learning with Differential Privacy: Algorithms
and Challenges for Continuous Data," Signal Processing Magazine, IEEE , vol.30, no.5, pp.86,94, Sept. 2013
doi: 10.1109/MSP.2013.2259911

•

Mivule, K; Turner, C; and Y. Ji, S., “Towards A Differential Privacy and Utility Preserving Machine Learning
Classifier,” in Procedia Computer Science, 2012, vol. 12, pp. 176–181.

•

Mivule, Kato, "Utilizing Noise Addition for Data Privacy, an Overview", Proceedings of the International
Conference on Information and Knowledge Engineering (IKE 2012), Pages 65-71, Las Vegas, NV, USA.

Bowie State University Department of Computer Science

More Related Content

What's hot

Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
Kato Mivule
 
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
IJDKP
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
Kato Mivule
 
PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM
PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREMPRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM
PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM
IJNSA Journal
 
Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachTowards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
CSCJournals
 
Ppback propagation-bansal-zhong-2010
Ppback propagation-bansal-zhong-2010Ppback propagation-bansal-zhong-2010
Ppback propagation-bansal-zhong-2010girivaishali
 
Intuidex - To be or not to be iid by William M. Pottenger (NYC Machine Learni...
Intuidex - To be or not to be iid by William M. Pottenger (NYC Machine Learni...Intuidex - To be or not to be iid by William M. Pottenger (NYC Machine Learni...
Intuidex - To be or not to be iid by William M. Pottenger (NYC Machine Learni...
Hakka Labs
 
Hy3414631468
Hy3414631468Hy3414631468
Hy3414631468
IJERA Editor
 
Ijnsa050202
Ijnsa050202Ijnsa050202
Ijnsa050202
IJNSA Journal
 
Privacy Preserving Clustering on Distorted data
Privacy Preserving Clustering on Distorted dataPrivacy Preserving Clustering on Distorted data
Privacy Preserving Clustering on Distorted data
IOSR Journals
 
Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...
ijitjournal
 
Efficiency of LSB steganography on medical information
Efficiency of LSB steganography on medical information Efficiency of LSB steganography on medical information
Efficiency of LSB steganography on medical information
IJECEIAES
 
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET Journal
 
On distributed fuzzy decision trees for big data
On distributed fuzzy decision trees for big dataOn distributed fuzzy decision trees for big data
On distributed fuzzy decision trees for big data
nexgentechnology
 
A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing with
ijcsa
 
DATA AUGMENTATION TECHNIQUES AND TRANSFER LEARNING APPROACHES APPLIED TO FACI...
DATA AUGMENTATION TECHNIQUES AND TRANSFER LEARNING APPROACHES APPLIED TO FACI...DATA AUGMENTATION TECHNIQUES AND TRANSFER LEARNING APPROACHES APPLIED TO FACI...
DATA AUGMENTATION TECHNIQUES AND TRANSFER LEARNING APPROACHES APPLIED TO FACI...
ijaia
 
130509
130509130509
MITIGATION TECHNIQUES TO OVERCOME DATA HARM IN MODEL BUILDING FOR ML
MITIGATION TECHNIQUES TO OVERCOME DATA HARM IN MODEL BUILDING FOR MLMITIGATION TECHNIQUES TO OVERCOME DATA HARM IN MODEL BUILDING FOR ML
MITIGATION TECHNIQUES TO OVERCOME DATA HARM IN MODEL BUILDING FOR ML
ijaia
 
Query Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain ObjectsQuery Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain Objects
1crore projects
 

What's hot (20)

Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM
PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREMPRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM
PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM
 
Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachTowards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
 
Ppback propagation-bansal-zhong-2010
Ppback propagation-bansal-zhong-2010Ppback propagation-bansal-zhong-2010
Ppback propagation-bansal-zhong-2010
 
Intuidex - To be or not to be iid by William M. Pottenger (NYC Machine Learni...
Intuidex - To be or not to be iid by William M. Pottenger (NYC Machine Learni...Intuidex - To be or not to be iid by William M. Pottenger (NYC Machine Learni...
Intuidex - To be or not to be iid by William M. Pottenger (NYC Machine Learni...
 
Hy3414631468
Hy3414631468Hy3414631468
Hy3414631468
 
Ijnsa050202
Ijnsa050202Ijnsa050202
Ijnsa050202
 
Privacy Preserving Clustering on Distorted data
Privacy Preserving Clustering on Distorted dataPrivacy Preserving Clustering on Distorted data
Privacy Preserving Clustering on Distorted data
 
Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...
 
Efficiency of LSB steganography on medical information
Efficiency of LSB steganography on medical information Efficiency of LSB steganography on medical information
Efficiency of LSB steganography on medical information
 
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...IRJET -  	  Random Data Perturbation Techniques in Privacy Preserving Data Mi...
IRJET - Random Data Perturbation Techniques in Privacy Preserving Data Mi...
 
On distributed fuzzy decision trees for big data
On distributed fuzzy decision trees for big dataOn distributed fuzzy decision trees for big data
On distributed fuzzy decision trees for big data
 
A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing with
 
DATA AUGMENTATION TECHNIQUES AND TRANSFER LEARNING APPROACHES APPLIED TO FACI...
DATA AUGMENTATION TECHNIQUES AND TRANSFER LEARNING APPROACHES APPLIED TO FACI...DATA AUGMENTATION TECHNIQUES AND TRANSFER LEARNING APPROACHES APPLIED TO FACI...
DATA AUGMENTATION TECHNIQUES AND TRANSFER LEARNING APPROACHES APPLIED TO FACI...
 
CV January 2011
CV January 2011CV January 2011
CV January 2011
 
130509
130509130509
130509
 
MITIGATION TECHNIQUES TO OVERCOME DATA HARM IN MODEL BUILDING FOR ML
MITIGATION TECHNIQUES TO OVERCOME DATA HARM IN MODEL BUILDING FOR MLMITIGATION TECHNIQUES TO OVERCOME DATA HARM IN MODEL BUILDING FOR ML
MITIGATION TECHNIQUES TO OVERCOME DATA HARM IN MODEL BUILDING FOR ML
 
Query Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain ObjectsQuery Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain Objects
 

Viewers also liked

Atmospheric variables
Atmospheric variablesAtmospheric variables
Atmospheric variableseudalddiaz
 
Variable components of the atmosphere
Variable components of the atmosphereVariable components of the atmosphere
Variable components of the atmosphereJhunisa Agustin
 
Diss defense
Diss defenseDiss defense
Diss defensetherob762
 
Messina Proposal and Oral Defense
Messina Proposal and Oral Defense Messina Proposal and Oral Defense
Messina Proposal and Oral Defense
alexmessina
 
Burton Industries ppt 2012
Burton Industries ppt 2012Burton Industries ppt 2012
Burton Industries ppt 2012
Burton Industries
 
Wonju Medical Industry Techno Valley Introduction
Wonju Medical Industry Techno Valley IntroductionWonju Medical Industry Techno Valley Introduction
Wonju Medical Industry Techno Valley Introduction
gmesmatch
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
Kato Mivule
 
4 Seasons Virtual Field Trip
4 Seasons Virtual Field Trip4 Seasons Virtual Field Trip
4 Seasons Virtual Field Triphhfricke
 
17.mengadministrasi server dalam_jaringan
17.mengadministrasi server dalam_jaringan17.mengadministrasi server dalam_jaringan
17.mengadministrasi server dalam_jaringanAn Atsa
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Kato Mivule
 
HumanCloud - Trace
HumanCloud - TraceHumanCloud - Trace
HumanCloud - Trace
utkarsh_hcbs
 
Book Design by Jason Gonzales
Book Design by Jason GonzalesBook Design by Jason Gonzales
Book Design by Jason GonzalesJason Gonzales
 
PROFESSIONAL LEARNING NETWORKS- MASS CUE 2013
PROFESSIONAL LEARNING NETWORKS- MASS CUE 2013PROFESSIONAL LEARNING NETWORKS- MASS CUE 2013
PROFESSIONAL LEARNING NETWORKS- MASS CUE 2013
Jennifer L. Scheffer
 
Top Firefox Addons
Top Firefox AddonsTop Firefox Addons
Top Firefox Addonstechnobz
 
Ttss consulting(1)
Ttss consulting(1)Ttss consulting(1)
Ttss consulting(1)
Steven Trom
 
Wmit introduction 2012 english slideshare
Wmit introduction 2012 english slideshareWmit introduction 2012 english slideshare
Wmit introduction 2012 english slidesharegmesmatch
 
Baker Business Bootcamp
Baker Business BootcampBaker Business Bootcamp
Baker Business Bootcamp
LGLG Ministry
 
Реальные углы обзора видеорегистраторов
Реальные углы обзора видеорегистраторовРеальные углы обзора видеорегистраторов
Реальные углы обзора видеорегистраторовarsney
 
Lesson 7 world_history_medieval_period_new_
Lesson 7 world_history_medieval_period_new_Lesson 7 world_history_medieval_period_new_
Lesson 7 world_history_medieval_period_new_Anna Romana
 

Viewers also liked (20)

Atmospheric variables
Atmospheric variablesAtmospheric variables
Atmospheric variables
 
Variable components of the atmosphere
Variable components of the atmosphereVariable components of the atmosphere
Variable components of the atmosphere
 
Diss defense
Diss defenseDiss defense
Diss defense
 
Messina Proposal and Oral Defense
Messina Proposal and Oral Defense Messina Proposal and Oral Defense
Messina Proposal and Oral Defense
 
Burton Industries ppt 2012
Burton Industries ppt 2012Burton Industries ppt 2012
Burton Industries ppt 2012
 
Wonju Medical Industry Techno Valley Introduction
Wonju Medical Industry Techno Valley IntroductionWonju Medical Industry Techno Valley Introduction
Wonju Medical Industry Techno Valley Introduction
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
4 Seasons Virtual Field Trip
4 Seasons Virtual Field Trip4 Seasons Virtual Field Trip
4 Seasons Virtual Field Trip
 
17.mengadministrasi server dalam_jaringan
17.mengadministrasi server dalam_jaringan17.mengadministrasi server dalam_jaringan
17.mengadministrasi server dalam_jaringan
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
 
HumanCloud - Trace
HumanCloud - TraceHumanCloud - Trace
HumanCloud - Trace
 
About P&T
About P&TAbout P&T
About P&T
 
Book Design by Jason Gonzales
Book Design by Jason GonzalesBook Design by Jason Gonzales
Book Design by Jason Gonzales
 
PROFESSIONAL LEARNING NETWORKS- MASS CUE 2013
PROFESSIONAL LEARNING NETWORKS- MASS CUE 2013PROFESSIONAL LEARNING NETWORKS- MASS CUE 2013
PROFESSIONAL LEARNING NETWORKS- MASS CUE 2013
 
Top Firefox Addons
Top Firefox AddonsTop Firefox Addons
Top Firefox Addons
 
Ttss consulting(1)
Ttss consulting(1)Ttss consulting(1)
Ttss consulting(1)
 
Wmit introduction 2012 english slideshare
Wmit introduction 2012 english slideshareWmit introduction 2012 english slideshare
Wmit introduction 2012 english slideshare
 
Baker Business Bootcamp
Baker Business BootcampBaker Business Bootcamp
Baker Business Bootcamp
 
Реальные углы обзора видеорегистраторов
Реальные углы обзора видеорегистраторовРеальные углы обзора видеорегистраторов
Реальные углы обзора видеорегистраторов
 
Lesson 7 world_history_medieval_period_new_
Lesson 7 world_history_medieval_period_new_Lesson 7 world_history_medieval_period_new_
Lesson 7 world_history_medieval_period_new_
 

Similar to Lit Review Talk - Signal Processing and Machine Learning with Differential Privacy Algorithms and challenges for continuous data

Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Presentation of PhD thesis on Location Data Fusion
Presentation of PhD thesis on Location Data Fusion Presentation of PhD thesis on Location Data Fusion
Presentation of PhD thesis on Location Data Fusion
Alket Cecaj
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
CS, NcState
 
DBMS
DBMSDBMS
Linked Data Quality Assessment – daQ and Luzzu
Linked Data Quality Assessment – daQ and LuzzuLinked Data Quality Assessment – daQ and Luzzu
Linked Data Quality Assessment – daQ and Luzzu
jerdeb
 
Re-identification of Anomized CDR datasets using Social networlk Data
Re-identification of Anomized CDR datasets using Social networlk DataRe-identification of Anomized CDR datasets using Social networlk Data
Re-identification of Anomized CDR datasets using Social networlk Data
Alket Cecaj
 
Building AI with Security Privacy in Mind
Building AI with Security Privacy in MindBuilding AI with Security Privacy in Mind
Building AI with Security Privacy in Mind
geetachauhan
 
Building AI with Security and Privacy in mind
Building AI with Security and Privacy in mindBuilding AI with Security and Privacy in mind
Building AI with Security and Privacy in mind
geetachauhan
 
IoT Processing Topologies.pptx
IoT Processing Topologies.pptxIoT Processing Topologies.pptx
IoT Processing Topologies.pptx
taruian
 
03 presentation-bothiesson
03 presentation-bothiesson03 presentation-bothiesson
03 presentation-bothiesson
InfinIT - Innovationsnetværket for it
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Kato Mivule
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
Liwei Ren任力偉
 
Data and Knowledge Discovery in Databases (KDD)
Data and  Knowledge Discovery in Databases (KDD)Data and  Knowledge Discovery in Databases (KDD)
Data and Knowledge Discovery in Databases (KDD)
Abdelrahman Alkilani
 
Amrita_IntroCommnSys_WelcomeLecture.pptx
Amrita_IntroCommnSys_WelcomeLecture.pptxAmrita_IntroCommnSys_WelcomeLecture.pptx
Amrita_IntroCommnSys_WelcomeLecture.pptx
ssuser48925a
 
Differential privacy and ml
Differential privacy and mlDifferential privacy and ml
Differential privacy and ml
Samuel Witherspoon
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptx
SubhrajyotiPayra
 
Data Science and Analysis.pptx
Data Science and Analysis.pptxData Science and Analysis.pptx
Data Science and Analysis.pptx
PrashantYadav931011
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewKato Mivule
 
IoT module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf
IoT  module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdfIoT  module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf
IoT module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf
SURESHA V
 

Similar to Lit Review Talk - Signal Processing and Machine Learning with Differential Privacy Algorithms and challenges for continuous data (20)

Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Presentation of PhD thesis on Location Data Fusion
Presentation of PhD thesis on Location Data Fusion Presentation of PhD thesis on Location Data Fusion
Presentation of PhD thesis on Location Data Fusion
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
 
DBMS
DBMSDBMS
DBMS
 
Linked Data Quality Assessment – daQ and Luzzu
Linked Data Quality Assessment – daQ and LuzzuLinked Data Quality Assessment – daQ and Luzzu
Linked Data Quality Assessment – daQ and Luzzu
 
Re-identification of Anomized CDR datasets using Social networlk Data
Re-identification of Anomized CDR datasets using Social networlk DataRe-identification of Anomized CDR datasets using Social networlk Data
Re-identification of Anomized CDR datasets using Social networlk Data
 
Building AI with Security Privacy in Mind
Building AI with Security Privacy in MindBuilding AI with Security Privacy in Mind
Building AI with Security Privacy in Mind
 
Building AI with Security and Privacy in mind
Building AI with Security and Privacy in mindBuilding AI with Security and Privacy in mind
Building AI with Security and Privacy in mind
 
IoT Processing Topologies.pptx
IoT Processing Topologies.pptxIoT Processing Topologies.pptx
IoT Processing Topologies.pptx
 
03 presentation-bothiesson
03 presentation-bothiesson03 presentation-bothiesson
03 presentation-bothiesson
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Data and Knowledge Discovery in Databases (KDD)
Data and  Knowledge Discovery in Databases (KDD)Data and  Knowledge Discovery in Databases (KDD)
Data and Knowledge Discovery in Databases (KDD)
 
Amrita_IntroCommnSys_WelcomeLecture.pptx
Amrita_IntroCommnSys_WelcomeLecture.pptxAmrita_IntroCommnSys_WelcomeLecture.pptx
Amrita_IntroCommnSys_WelcomeLecture.pptx
 
Differential privacy and ml
Differential privacy and mlDifferential privacy and ml
Differential privacy and ml
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptx
 
Data Science and Analysis.pptx
Data Science and Analysis.pptxData Science and Analysis.pptx
Data Science and Analysis.pptx
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an Overview
 
IoT module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf
IoT  module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdfIoT  module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf
IoT module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf
 

More from Kato Mivule

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
Kato Mivule
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Kato Mivule
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Kato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
Kato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule
 
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...Kato Mivule
 
Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Kato Mivule
 
Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaApplying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 

More from Kato Mivule (12)

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
 
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
 
Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview
 
Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaApplying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Lit Review Talk - Signal Processing and Machine Learning with Differential Privacy Algorithms and challenges for continuous data

  • 1. Signal Processing and Data Privacy Literature Review – Talk By Kato Mivule COSC891 Fall 2013 Signal Processing and Machine Learning with Differential Privacy Algorithms and challenges for continuous data Sarwate, A.D.; Chaudhuri, K., "Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for Continuous Data," Signal Processing Magazine, IEEE , vol.30, no.5, pp.86,94, Sept. 2013 doi: 10.1109/MSP.2013.2259911 Bowie State University Department of Computer Science
  • 2. Signal Processing and Data Privacy Agenda • • • • • • Introduction. Privacy Definition Challenge. Differential Privacy Definition. Differential Privacy Challenges. Differential Privacy Applications in Signal Processing. Conclusion. Bowie State University Department of Computer Science
  • 3. Signal Processing and Data Privacy Introduction: Privacy Preserving Data Mining • Maintaining the privacy of individuals is imperative. • Individuals expect their data to be kept private despite willingness to share such info. • The Challenge is how extract knowledge from large scale data while maintaining privacy. Bowie State University Department of Computer Science
  • 4. Signal Processing and Data Privacy Introduction: Privacy Definition • Privacy definition is problematic. • There are different meaning for these words across different communities: • Privacy • Confidentiality • Security • “There is no real separation between individuals’ identity and their data—the pattern of data associated with an individual is itself uniquely identifying.” Sarwate and Chaudhuri (2013) Bowie State University Department of Computer Science
  • 5. Signal Processing and Data Privacy Differential Privacy Definition • Cryptographically Motivated. • Proposed by Cynthia Dwork (2006). • Imposes confidentiality by returning perturbed query responses from databases: • 𝒇 𝒙 + 𝑳𝒂𝒑𝒍𝒂𝒄𝒆(𝟎, 𝒃) • 𝒃= • ∆𝒇 𝜺 ∆𝒇 = 𝑴𝒂𝒙 𝒇 𝑫 𝟏 − 𝒇 𝑫 𝟐 • The end user of the database cannot know if a data item has been altered. • An attacker cannot gain information about any data item in the database. Bowie State University Department of Computer Science
  • 6. Signal Processing and Data Privacy Differential Privacy Definition: ε-differential privacy is satisfied if the results to a query run on database D1 and D2 should probabilistically be similar, and meet the following condition:  𝑷[𝒒 𝒏 (𝑫 𝟏 )∈𝑹] 𝑷[𝒒 𝒏 𝑫 𝟐 ∈𝑹] ≤ 𝒆𝜺  Where D1 and D2 are the two databases   P is the probability of the perturbed query results D1 and D2. qn() is the privacy granting procedure (perturbation).   qn(D1) is the privacy granting procedure on query results from database D1. qn(D2) is the privacy granting procedure on query results from database D2.   R is the perturbed query results from the databases D1 and D2 respectively. 𝒆 𝜺 is the exponential e epsilon value. Bowie State University Department of Computer Science
  • 7. Signal Processing and Data Privacy Differential Privacy Definition – Types • Query-based Differential Privacy. • Input perturbation based differential privacy – add Laplace noise to the data. • Output perturbation – add Laplace noise to the query results. Bowie State University Department of Computer Science
  • 8. Signal Processing and Data Privacy Differential Privacy – Input and Output Perturbation Image Source: Sarwate, A.D.; Chaudhuri, K., "Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for Continuous Data," Signal Processing Magazine, IEEE , vol.30, no.5, pp.86,94, Sept. 2013 doi: 10.1109/MSP.2013.2259911 Bowie State University Department of Computer Science
  • 9. Signal Processing and Data Privacy Differential Privacy Challenges • There is a tension between data privacy and data utility. • Evaluating the impact of privacy restrictions on utility. • Data dimensionality. • Trade-off points between data privacy and utility. Bowie State University Department of Computer Science
  • 10. Signal Processing and Data Privacy Differential Privacy Challenges – Utility Quantification • Mean Squared Error – for statistical estimation. • • Computed as follows: Original and privatized datasets 𝑋 − 𝑋 ′ 𝑑 𝑗=1 𝑛 ′ 2 𝑖=1(𝑥 𝑖𝑗 −𝑥 𝑖𝑗 ) 𝑛𝑑 • Expected loss – for classification. • Comparative analysis – quantify various differential privacy algorithms. • Where n is the number of records and d the number of variables in the table. Bowie State University Department of Computer Science
  • 11. Signal Processing and Data Privacy Differential Privacy Challenges – Limitations • Time Series and Filtering problems. • Understanding the fundamental limits for continuous data may shed some light on which signal processing tasks are possible under differential privacy. • The optimal differential privacy parameter adjustment for acceptable levels of data utility – adjustment of the 𝜺 value. • A single data set could be used in multiple computations – challenge is how to keep the same differential privacy across the board. Bowie State University Department of Computer Science
  • 12. Signal Processing and Data Privacy Differential Privacy – Signal Processing Applications • Apply differential piracy in signal processing problems. • Apply signal processing to the differential privacy problem of data utility. • Time Series and Filtering problems. • Differential privacy of a query sequence in Fourier domain and use homomorphic encryption for distributed noise addition. • Kalman filtering applied to a differentially private time series. • Kalman filtering used on aggregated signals after input and output perturbation. Bowie State University Department of Computer Science
  • 13. Signal Processing and Data Privacy Differential Privacy – Applications • Integrate differential privacy in signal processing. • Use signal processing to enhance data utility and privacy. • Use signal processing to filter out unneeded noise. • Research areas – applying differential privacy in signal processing for: • • • • Image processing Network information systems Cryptographic approaches Social networks Bowie State University Department of Computer Science
  • 14. Signal Processing and Data Privacy Conclusion • A general overview of the differential privacy is given. • The paper focused on differential privacy and the applications in signal processing. • The paper suggests research areas for applying differential privacy in signal processing. • Implementation is left to the readers. Bowie State University Department of Computer Science
  • 15. Signal Processing and Data Privacy References • Sarwate, A.D.; Chaudhuri, K., "Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for Continuous Data," Signal Processing Magazine, IEEE , vol.30, no.5, pp.86,94, Sept. 2013 doi: 10.1109/MSP.2013.2259911 • Mivule, K; Turner, C; and Y. Ji, S., “Towards A Differential Privacy and Utility Preserving Machine Learning Classifier,” in Procedia Computer Science, 2012, vol. 12, pp. 176–181. • Mivule, Kato, "Utilizing Noise Addition for Data Privacy, an Overview", Proceedings of the International Conference on Information and Knowledge Engineering (IKE 2012), Pages 65-71, Las Vegas, NV, USA. Bowie State University Department of Computer Science