Loading [MathJax]/extensions/MathMenu.js
An Efficient Differential Privacy Logistic Classification Mechanism | IEEE Journals & Magazine | IEEE Xplore

An Efficient Differential Privacy Logistic Classification Mechanism


Abstract:

The logistic model is a very elementary and important model in the field of machine learning. In this article, an efficient differential privacy logistic classification m...Show More

Abstract:

The logistic model is a very elementary and important model in the field of machine learning. In this article, an efficient differential privacy logistic classification mechanism is proposed. The proposed mechanism is better than object function perturbation mechanism in terms of running time and accuracy. Regarding accuracy, the proposed mechanism's accuracy is almost the same as the no differential privacy (non-dp) mechanism, and the proposed mechanism is better than that of the object function perturbation mechanism in both the test accuracy and the train accuracy. As for the running time of the training model, the proposed mechanism is better than the object function mechanism and is the same as the non-dp mechanism.
Published in: IEEE Internet of Things Journal ( Volume: 6, Issue: 6, December 2019)
Page(s): 10620 - 10626
Date of Publication: 09 September 2019

ISSN Information:

Funding Agency:

Author image of Wen Huang
School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China
Wen Huang received the B.E. degree in computer science and technology from the University of Electronic Science and Technology of China, Chengdu, China, in 2016, where he is currently pursuing the Doctoral degree in software engineering.
His current research interests include cryptography and information security.
Mr. Huang is a member of ACM and CCF.
Wen Huang received the B.E. degree in computer science and technology from the University of Electronic Science and Technology of China, Chengdu, China, in 2016, where he is currently pursuing the Doctoral degree in software engineering.
His current research interests include cryptography and information security.
Mr. Huang is a member of ACM and CCF.View more
Author image of Shijie Zhou
School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China
Shijie Zhou received the Ph.D. degree in computer science and technology from the University of Electronic Science and Technology of China (UESTC), Chengdu, China, in 2004.
He is currently a Professor with the School of Information and Software Engineering, UESTC. His current research interests include communication and security in computer networks, peer-to-peer networks, sensor networks, cloud security, and big data.
Shijie Zhou received the Ph.D. degree in computer science and technology from the University of Electronic Science and Technology of China (UESTC), Chengdu, China, in 2004.
He is currently a Professor with the School of Information and Software Engineering, UESTC. His current research interests include communication and security in computer networks, peer-to-peer networks, sensor networks, cloud security, and big data.View more
Author image of Yongjian Liao
School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China
Yongjian Liao received the Ph.D. degree in applied electronic science and technology from the College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China, in 2007.
He is currently an Associate Professor with the School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China. His current research interests include public key crypto...Show More
Yongjian Liao received the Ph.D. degree in applied electronic science and technology from the College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China, in 2007.
He is currently an Associate Professor with the School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China. His current research interests include public key crypto...View more
Author image of Hongjie Chen
School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China
Hongjie Chen received the B.S. degree in information security from the Chongqing University of Posts and Telecommunications, Chongqing, China, in 2017. She is currently pursuing the master’s degree in cryptography with the University of Electronic Science and Technology of China, Chengdu, China.
Her current research interests include cryptography and information security.
Hongjie Chen received the B.S. degree in information security from the Chongqing University of Posts and Telecommunications, Chongqing, China, in 2017. She is currently pursuing the master’s degree in cryptography with the University of Electronic Science and Technology of China, Chengdu, China.
Her current research interests include cryptography and information security.View more

I. Introduction

Logistic model deserves to be studied more. It is one of the most elementary and important models of machine learning. Now, it is used in many application scenarios that are meaningful in our daily life, such as medical industry, financial business, and transport industry. For example, it can be used to help administrators to make better decisions about bus dispatch.

Author image of Wen Huang
School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China
Wen Huang received the B.E. degree in computer science and technology from the University of Electronic Science and Technology of China, Chengdu, China, in 2016, where he is currently pursuing the Doctoral degree in software engineering.
His current research interests include cryptography and information security.
Mr. Huang is a member of ACM and CCF.
Wen Huang received the B.E. degree in computer science and technology from the University of Electronic Science and Technology of China, Chengdu, China, in 2016, where he is currently pursuing the Doctoral degree in software engineering.
His current research interests include cryptography and information security.
Mr. Huang is a member of ACM and CCF.View more
Author image of Shijie Zhou
School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China
Shijie Zhou received the Ph.D. degree in computer science and technology from the University of Electronic Science and Technology of China (UESTC), Chengdu, China, in 2004.
He is currently a Professor with the School of Information and Software Engineering, UESTC. His current research interests include communication and security in computer networks, peer-to-peer networks, sensor networks, cloud security, and big data.
Shijie Zhou received the Ph.D. degree in computer science and technology from the University of Electronic Science and Technology of China (UESTC), Chengdu, China, in 2004.
He is currently a Professor with the School of Information and Software Engineering, UESTC. His current research interests include communication and security in computer networks, peer-to-peer networks, sensor networks, cloud security, and big data.View more
Author image of Yongjian Liao
School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China
Yongjian Liao received the Ph.D. degree in applied electronic science and technology from the College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China, in 2007.
He is currently an Associate Professor with the School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China. His current research interests include public key cryptography and information security, in particular, cryptographic protocols.
Yongjian Liao received the Ph.D. degree in applied electronic science and technology from the College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China, in 2007.
He is currently an Associate Professor with the School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China. His current research interests include public key cryptography and information security, in particular, cryptographic protocols.View more
Author image of Hongjie Chen
School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China
Hongjie Chen received the B.S. degree in information security from the Chongqing University of Posts and Telecommunications, Chongqing, China, in 2017. She is currently pursuing the master’s degree in cryptography with the University of Electronic Science and Technology of China, Chengdu, China.
Her current research interests include cryptography and information security.
Hongjie Chen received the B.S. degree in information security from the Chongqing University of Posts and Telecommunications, Chongqing, China, in 2017. She is currently pursuing the master’s degree in cryptography with the University of Electronic Science and Technology of China, Chengdu, China.
Her current research interests include cryptography and information security.View more
Contact IEEE to Subscribe

References

References is not available for this document.