Mixup Based Privacy Preserving Mixed Collaboration Learning | IEEE Conference Publication | IEEE Xplore

Mixup Based Privacy Preserving Mixed Collaboration Learning


Abstract:

The amount of high-quality data determines the performance of the deep learning model. In reality, the data is often physically distributed in different organizations, an...Show More

Abstract:

The amount of high-quality data determines the performance of the deep learning model. In reality, the data is often physically distributed in different organizations, and model averaging can train a deep model on the distributed data, while providing competitive performance compared with training a model on the centralized data. However, it cannot prevent inversion attack, as the intermediate parameters are transmitted during training. Some data enhancement methods, such as mixup, can effectively enhance the data privacy. In this paper, we propose a novel model averaging method combined with mixup, which provides protection against inversion attack. Besides we conduct experiments using state-of-the-art deep network architectures on multiple types of dataset to show that our method improves the classification accuracy of models.
Date of Conference: 04-09 April 2019
Date Added to IEEE Xplore: 06 May 2019
ISBN Information:

ISSN Information:

Conference Location: San Francisco, CA, USA
References is not available for this document.

I. Introduction

In recent years, deep learning has attracted great attention from industry and academia, and has been greatly developed in the medical, financial, education, Internet, and etc [1]–[3]. The performance of the deep neural network model is closely related to the scale and quality of the data [4]. More high-quality data can greatly improve the performance of the model. In reality, data is often held by different organizations. For example, for diabetic retinopathy, different hospitals can collect case samples of different characteristics (such as region and age). If these samples are put together, the accuracy and robustness of the detection model can be significantly improved. However, privacy and data laws in some countries or organizations prohibit transmission of raw data across country or organization [5], [6]. In view of the current situation that data in various professional fields is not open, how to make full use of richer data features under the premise of ensuring data privacy of different organizations has become an urgent challenge for deep learning.

Select All
1.
A. Frome, G. S. Corrado, J. Shlens, S. Bengio, J. Dean, T. Mikolov et al., "Devise: A deep visual-semantic embedding model" in Advances in neural information processing systems, pp. 2121-2129, 2013.
2.
P. Shi, H. Wang, Z. Zheng and H. Yin, "Collaboration environment for JointCloud computing", SCIENTIA SINICA Informationis, vol. 47, no. 9, pp. 1129-1148, 2017.
3.
H. Wang, P. Shi and Y. Zhang, "Jointcloud: A cross-cloud cooperation architecture for integrated internet service customization", 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 1846-1855, 2017.
4.
A. Amir-Khalili, S. Kianzad, R. Abugharbieh and I. Beschastnikh, "Scalable and Fault Tolerant Platform for Distributed Learning on Private Medical Data", International Workshop on Machine Learning in Medical Imaging, pp. 176-184, 2017.
5.
I. Cano, M. Weimer, D. Mahajan, C. Curino and G. M. Fu-marola, Towards geo-distributed machine learning, 2016.
6.
A. Vulimiri, C. Curino, P. B. Godfrey, T. Jungblut, J. Padhye and G. Varghese, "Global Analytics in the Face of Bandwidth and Regulatory Constraints", NSDI, vol. 7, no. 7. 2, pp. 7-8, 2015.
7.
A. Kurakin, I. Goodfellow, S. Bengio, Y. Dong, F. Liao, M. Liang, T. Pang, J. Zhu, X. Hu, C. Xie et al., Adversarial attacks and defences competition, 2018.
8.
M. Fredrikson, S. Jha and T. Ristenpart, "Model inversion attacks that exploit confidence information and basic countermeasures", Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322-1333, 2015.
9.
H. Zhang, M. Cisse, Y. N. Dauphin and D. Lopez-Paz, mixup: Beyond empirical risk minimization, 2017.
10.
P. Kairouz, S. Oh and P. Viswanath, "Differentially private multi-party computation" in CISS, pp. 128-132, 2016.
11.
M. d. Cock, R. Dowsley, A. C. Nascimento and S. C. Newman, "Fast privacy preserving linear regression over distributed datasets based on pre-distributed data", Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, pp. 3-14, 2015.
12.
A. El Attar, A. Pigeau and M. Gelgon, "A decentralized and robust approach to estimating a probabilistic mixture model for structuring distributed data", 2011 IEEE/WICIACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), vol. 1, pp. 372-379, 2011.
13.
B. McMahan, E. Moore, D. Ramage, S. Hampson and B. A. y Arcas, "Communication-Efficient Learning of Deep Networks from Decentralized Data" in Artificial Intelligence and Statistics, pp. 1273-1282, 2017.
14.
P. Goyal, P. Dollár, R. Girshick, P. Noordhuis, L. Wesolowski, A. Kyrola, et al., Accurate large minibatch SGD: training imagenet in 1 hour, 2017.
15.
A. Krizhevsky and G. Hinton, "Learning multiple layers of features from tiny images" in Citeseer Tech. Rep., 2009.
16.
K. Simonyan and A. Zisserman, Very deep convolutional networks for large-scale image recognition, 2014.
17.
K. He, X. Zhang, S. Ren and J. Sun, "Deep residual learning for image recognition", Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770-778, 2016.
18.
G. Huang, Z. Liu, L. Van Der Maaten and K. Q. Weinberger, "Densely connected convolutional networks", CVPR, vol. 1, no. 2, pp. 3, 2017.
19.
K. Greff, R. K. Srivastava, J. Koutnik, B. R. Steunebrink and J. Schmid-huber, "LSTM: A search space odyssey", IEEE transactions on neural networks and learning systems, vol. 28, no. 10, pp. 2222-2232, 2017.
20.
G. E. Hinton, S. Sabour and N. Frosst, Matrix capsules with EM routing, 2018.
21.
F. S. Samaria and A. C. Harter, "Parameterisation of a stochastic model for human face identification", Proceedings of the Second IEEE Workshop on Applications of Computer Vision, pp. 138-142, 1994.

Contact IEEE to Subscribe

References

References is not available for this document.