skip to main content
10.1145/2808769.2808775acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Differential Privacy for Classifier Evaluation

Authors Info & Claims
Published:16 October 2015Publication History

ABSTRACT

Differential privacy provides powerful guarantees that individuals incur minimal additional risk by including their personal data in a database. Most work in differential privacy has focused on differentially private algorithms that produce models, counts, and histograms. Nevertheless, even with a classification model produced by a differentially private algorithm, directly reporting the classifier's performance on a database has the potential for disclosure. Thus, differentially private computation of evaluation metrics for machine learning is an important research area. We find effective mechanisms for area under the receiver-operating characteristic (ROC) curve and average precision.

References

  1. K. Bache and M. Lichman. UCI machine learning repository, 2013.Google ScholarGoogle Scholar
  2. K. Boyd, V. S. Costa, J. Davis, and D. Page. Unachievable region in precision-recall space and its effect on empirical evaluation. In ICML, pages 639--646, 2012.Google ScholarGoogle Scholar
  3. K. Chaudhuri, C. Monteleoni, and A. D. Sarwate. Differentially private empirical risk minimization. The Journal of Machine Learning Research, 12:1069--1109, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. Chaudhuri and S. A. Vinterbo. A stability-based validation procedure for differentially private machine learning. In NIPS, pages 2652--2660, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Dwork. Differential privacy. In ICALP. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography, pages 265--284. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Friedman and A. Schuster. Data mining with differential privacy. In KDD, pages 493--502. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Ghosh, T. Roughgarden, and M. Sundararajan. Universally utility-maximizing privacy mechanisms. In STOC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Hall, A. Rinaldo, and L. Wasserman. Differential privacy for functions and functional data. The Journal of Machine Learning Research, 14(1):703--727, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Kifer and A. Machanavajjhala. Pufferfish: A framework for mathematical privacy definitions. ACM Trans. Database Syst., 39(1):3:1--3:36, Jan. 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. D. Manning, P. Raghavan, and H. Schütze. Introduction to Information Retrieval. Cambridge University Press, New York, NY, USA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. G. J. Matthews and O. Harel. An examination of data confidentiality and disclosure issues related to publication of empiricalROC\ curves. Academic Radiology, 20(7):889 -- 896, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  13. K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, page 75. ACM Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. S. Pepe. The statistical evaluation of medical tests for classification and prediction. Oxford University Press, USA, 2004.Google ScholarGoogle Scholar
  15. F. J. Provost, T. Fawcett, and R. Kohavi. The case against accuracy estimation for comparing induction algorithms. In ICML, volume 98, pages 445--453, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. B. I. Rubinstein, P. L. Bartlett, L. Huang, and N. Taft. Learning in a large function space: Privacy-preserving mechanisms for svm learning. preprint arXiv:0911.5708, 2009.Google ScholarGoogle Scholar
  17. B. Stoddard, Y. Chen, and A. Machanavajjhala. Differentially private algorithms for empirical machine learning. preprint arXiv:1411.5428, 2014.Google ScholarGoogle Scholar
  18. L. Wasserman and S. Zhou. A statistical framework for differential privacy. Journal of the American Statistical Association, 105(489):375--389, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  19. J. Zhang, Z. Zhang, X. Xiao, Y. Yang, and M. Winslett. Functional mechanism: regression analysis under differential privacy. VLDB, 5(11):1364--1375, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Differential Privacy for Classifier Evaluation

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            AISec '15: Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security
            October 2015
            110 pages
            ISBN:9781450338264
            DOI:10.1145/2808769

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 16 October 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            AISec '15 Paper Acceptance Rate11of25submissions,44%Overall Acceptance Rate94of231submissions,41%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader