Adversarially Robust Streaming Algorithms via Differential Privacy
- URL: http://arxiv.org/abs/2004.05975v1
- Date: Mon, 13 Apr 2020 14:49:38 GMT
- Title: Adversarially Robust Streaming Algorithms via Differential Privacy
- Authors: Avinatan Hassidim, Haim Kaplan, Yishay Mansour, Yossi Matias, Uri
Stemmer
- Abstract summary: A streaming algorithm is said to be adversarially robust if its accuracy guarantees are maintained even when the data stream is chosen maliciously.
We establish a connection between adversarial robustness of streaming algorithms and the notion of differential privacy.
- Score: 68.3608356069755
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: A streaming algorithm is said to be adversarially robust if its accuracy
guarantees are maintained even when the data stream is chosen maliciously, by
an adaptive adversary. We establish a connection between adversarial robustness
of streaming algorithms and the notion of differential privacy. This connection
allows us to design new adversarially robust streaming algorithms that
outperform the current state-of-the-art constructions for many interesting
regimes of parameters.
Related papers
- Theoretically Principled Federated Learning for Balancing Privacy and
Utility [61.03993520243198]
We propose a general learning framework for the protection mechanisms that protects privacy via distorting model parameters.
It can achieve personalized utility-privacy trade-off for each model parameter, on each client, at each communication round in federated learning.
arXiv Detail & Related papers (2023-05-24T13:44:02Z) - A Framework for Adversarial Streaming via Differential Privacy and
Difference Estimators [26.151761714896118]
We study streaming algorithms that provide provable guarantees even when the input stream is chosen by an adaptive adversary.
We propose a novel framework for adversarial streaming that hybrids two recently suggested frameworks.
arXiv Detail & Related papers (2021-07-30T10:20:38Z) - Adversarial Robustness of Streaming Algorithms through Importance
Sampling [29.957317489789745]
We introduce adversarially robust streaming algorithms for central machine learning and algorithmic tasks.
Our results are based on a simple, but powerful, observation that many importance sampling-based algorithms give rise to adversarial robustness.
We empirically confirm the robustness of our algorithms on various adversarial attacks and demonstrate that by contrast, some common existing algorithms are not robust.
arXiv Detail & Related papers (2021-06-28T19:24:11Z) - Towards Robust Speech-to-Text Adversarial Attack [78.5097679815944]
This paper introduces a novel adversarial algorithm for attacking the state-of-the-art speech-to-text systems, namely DeepSpeech, Kaldi, and Lingvo.
Our approach is based on developing an extension for the conventional distortion condition of the adversarial optimization formulation.
Minimizing over this metric, which measures the discrepancies between original and adversarial samples' distributions, contributes to crafting signals very close to the subspace of legitimate speech recordings.
arXiv Detail & Related papers (2021-03-15T01:51:41Z) - Fast Convergence Algorithm for Analog Federated Learning [30.399830943617772]
We propose an AirComp-based FedSplit algorithm for efficient analog federated learning over wireless channels.
We prove that the proposed algorithm linearly converges to the optimal solutions under the assumption that the objective function is strongly convex and smooth.
Our algorithm is theoretically and experimentally verified to be much more robust to the ill-conditioned problems with faster convergence compared with other benchmark FL algorithms.
arXiv Detail & Related papers (2020-10-30T10:59:49Z) - A black-box adversarial attack for poisoning clustering [78.19784577498031]
We propose a black-box adversarial attack for crafting adversarial samples to test the robustness of clustering algorithms.
We show that our attacks are transferable even against supervised algorithms such as SVMs, random forests, and neural networks.
arXiv Detail & Related papers (2020-09-09T18:19:31Z) - Robust Reinforcement Learning with Wasserstein Constraint [49.86490922809473]
We show the existence of optimal robust policies, provide a sensitivity analysis for the perturbations, and then design a novel robust learning algorithm.
The effectiveness of the proposed algorithm is verified in the Cart-Pole environment.
arXiv Detail & Related papers (2020-06-01T13:48:59Z) - Towards Streaming Perception [70.68520310095155]
We present an approach that coherently integrates latency and accuracy into a single metric for real-time online perception.
The key insight behind this metric is to jointly evaluate the output of the entire perception stack at every time instant.
We focus on the illustrative tasks of object detection and instance segmentation in urban video streams, and contribute a novel dataset with high-quality and temporally-dense annotations.
arXiv Detail & Related papers (2020-05-21T01:51:35Z) - Differentially Private k-Means Clustering with Guaranteed Convergence [5.335316436366718]
Iterative clustering algorithms help us to learn the insights behind the data.
It may allow adversaries to infer the privacy of individuals with some background knowledge.
To protect individual privacy against such an inference attack, preserving differential privacy (DP) for the iterative clustering algorithms has been extensively studied.
arXiv Detail & Related papers (2020-02-03T22:53:47Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.