FDPBoost: Federated differential privacy gradient boosting decision trees

Journal of Information Security and Applications - Tập 74 - Trang 103468 - 2023
Yingjie Li1, Yan Feng1, Quan Qian1,2,3,4,5
1School of Computer Engineering & Science, Shanghai University, Shanghai 200444, China
2Center of Materials Informatics and Data Science, Materials Genome Institute, Shanghai University, Shanghai 200444, China
3Key Laboratory of Silicate Cultural Relics Conservation, Shanghai University, Ministry of Education, China
4Zhejiang Laboratory, Hangzhou, 311100, Zhejiang, China
5Shanghai Frontier Science Center of Mechanoinformatics, Shanghai 200444, China

Tài liệu tham khảo

Chaudhary P, Gupta R, Singh A, Majumder P. Analysis and Comparison of Various Fully Homomorphic Encryption Techniques. In: 2019 international conference on computing, power and communication technologies. GUCON, 2019, p. 58–62. Makkaoui KE, Beni-Hssane A, Ezzati A. Can hybrid Homomorphic Encryption schemes be practical?. In: 2016 5th international conference on multimedia computing and systems (ICMCS). 2016, p. 294–8. Kim HJ, Kim HI, Chang JW. A Privacy-Preserving kNN Classification Algorithm Using Yao’s Garbled Circuit on Cloud Computing. In: 2017 IEEE 10th international conference on cloud computing. CLOUD, 2017, p. 766–9. Meena M, Mahela OP, Kumar M, Kumar N. Detection and Classification of Complex Power Quality Disturbances Using Stockwell Transform and Rule Based Decision Tree. In: 2018 international conference on smart electric drives and power system. ICSEDPS, 2018, p. 220–6. Riazi MS, Javaheripi M, Hussain SU, Koushanfar F. MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation. In: 2019 IEEE international symposium on hardware oriented security and trust. HOST, 2019, p. 198–207. Dwork C, McSherry F, Nissim K, Smith A. Calibrating Noise to Sensitivity in Private Data Analysis. In: Third theory of cryptography conference (TCC 2006). 2006, p. 265–84. Zhang, 2019, A differential privacy support vector machine classifier based on dual variable perturbation, IEEE Access, 7, 98238, 10.1109/ACCESS.2019.2929680 Qi X, Ma X, Bai X, Li W. Differential Privacy Preserving Data Publishing Based on Bayesian Network. In: 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom). 2020, p. 1718–26. Li D, Wang J, Tan Z, Li X, Hu Y. Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks. In: 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom). 2020, p. 631–8. Liu, 2019 Zhao L, Ni L, Hu S, Chen Y, Zhou P, Xiao F, et al. InPrivate Digging: Enabling Tree-based Distributed Data Mining with Differential Privacy. In: IEEE INFOCOM 2018 - IEEE conference on computer communications. 2018, p. 2087–95. Gao, 2022, Towards fair and decentralized federated learning system for gradient boosting decision trees, Security Commun Netw, 10.1155/2022/4202084 Fei, 2019, A K-anonymity based schema for location privacy preservation, IEEE Trans Sustain Comput, 4, 156, 10.1109/TSUSC.2017.2733018 Kulkarni V, Kulkarni M, Pant A. Survey of Personalization Techniques for Federated Learning. In: 2020 fourth world conference on smart trends in systems, security and sustainability (WorldS4). 2020, p. 794–7. Yang, 2018 Bonawitz K, Eichner H, Grieskamp W, Huba D, Ingerman A, Ivanov V, et al. Towards Federated Learning at Scale: System Design. In: Proceedings of machine learning and systems 2019, MLSys 2019, Stanford, CA, USA, March 31 - April 2, 2019. 2019. Sjberg A, Gustavsson E, Koppisetty AC, Jirstrand M. Federated Learning of Deep Neural Decision Forests. In: Machine learning, optimization, and data science - 5th international conference, lod 2019, Siena, Italy, September 10-13, 2019, proceedings. 2019, p. 700–10. Zhang H, Bosch J, Olsson HH, Koppisetty AC. Af-dndf: Asynchronous federated learning of deep neural decision forests. In: 2021 47th euromicro conference on software engineering and advanced applications (SEAA), 2021. p. 308–15. Rajeshkanna A, Arunesh K. ID3 Decision Tree Classification: An Algorithmic Perspective based on Error rate. In: 2020 international conference on electronics and sustainable communication systems. ICESC, 2020, p. 787–90. Chen P. The Application of an Improved C4.5 Decision Tree. In: 2021 7th annual international conference on network and information systems for computers. ICNISC, 2021, p. 392–6. Kowshika S, Madhu mitha S, Madhu Varshini G, Megha V, Lakshmi K. IoT based Smart Shopping Trolley with Mobile Cart Application. In: 2021 7th international conference on advanced computing and communication systems. ICACCS, 2021, p. 1186–9. Haddouchi M, Berrado A. A survey of methods and tools used for interpreting Random Forest. In: 2019 1st international conference on smart systems and data science. ICSSD, 2019, p. 1–6. Friedman, 2001, Greedy function approximation: A gradient boosting machine, Ann Stat, 29, 1189, 10.1214/aos/1013203451 Nissim K, Mcsherry FD, Dwork C, Blum AL. Practical privacy: the SuLQ framework. In: Proceedings of the twenty-fourth ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems, June 13-15, 2005, Baltimore, Maryland, USA. 2005, p. 128–38. Hou, 2019, DPRF: A differential privacy protection random forest, IEEE Access, 7, 130707, 10.1109/ACCESS.2019.2939891 Yamamoto F, Wang L, Ozawa S. New Approaches to Federated XGBoost Learning for Privacy-Preserving Data Analysis. In: Neural information processing. Cham; 2020, p. 558–69. Li Q, Wu Z, Wen Z, He B. Privacy-Preserving Gradient Boosting Decision Trees. In: Proceedings of the AAAI conference on artificial intelligence. 2020, p. 784–91. Chen T, Guestrin C. XGBoost: A Scalable Tree Boosting System. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining. San Francisco, CA, United states; 2016, p. 785–94. Gou H, Su L, Zhang G, Huang W, Rao Y, Yang Y. A XGBoost Method Based on Telecom Customer Satisfaction Enhancement Strategy. In: 2022 5th international conference on pattern recognition and artificial intelligence (PRAI). 2022, p. 209–13. Friedman, 2002, Stochastic gradient boosting, Comput Stat Data Anal, 38, 367, 10.1016/S0167-9473(01)00065-2 Dwork, 2014, The algorithmic foundations of differential privacy, Found Trends Theoret Comput Sci, 9, 211 Machanavajjhala, 2007, L-diversity: Privacy beyond k-anonymity, ACM Trans Knowl Discov Data, 1, 3, 10.1145/1217299.1217302 Ren X, Yang J, Wei F. Research on diversity of sensitive attribute of K-anonymity. In: Proceeding of 2nd international workshop on database technology and applications, DBTA2010. Wuhan, China; 2010, p. 1–4. Wang X. Design and Implementation of College English Teaching Quality Evaluation System Based on Analytic Hierarchy Process. In: 2020 international conference on computers, information processing and advanced education (CIPAE). 2020, p. 213–6. Wei, 2021, Multi-objective machine learning of four mechanical properties of steels, Sci China Technol Sci, 51 Street, 2012, Nuclear feature extraction for breast tumor diagnosis, Proc Spie, 1993, 861 Fan, 2011