Skip to main content

Showing 1–5 of 5 results for author: Avent, B

.
  1. arXiv:2302.04833  [pdf, other

    cs.CR cs.DB

    Pushing the Boundaries of Private, Large-Scale Query Answering

    Authors: Brendan Avent, Aleksandra Korolova

    Abstract: We address the problem of efficiently and effectively answering large numbers of queries on a sensitive dataset while ensuring differential privacy (DP). We separately analyze this problem in two distinct settings, grounding our work in a state-of-the-art DP mechanism for large-scale query answering: the Relaxed Adaptive Projection (RAP) mechanism. The first setting is a classic setting in DP li… ▽ More

    Submitted 9 February, 2023; originally announced February 2023.

    Comments: Workshop on Privacy-Preserving Artificial Intelligence (PPAI-23), AAAI, 2023

  2. arXiv:1912.04977  [pdf, other

    cs.LG cs.CR stat.ML

    Advances and Open Problems in Federated Learning

    Authors: Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Hubert Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaid Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson , et al. (34 additional authors not shown)

    Abstract: Federated learning (FL) is a machine learning setting where many clients (e.g. mobile devices or whole organizations) collaboratively train a model under the orchestration of a central server (e.g. service provider), while kee** the training data decentralized. FL embodies the principles of focused data collection and minimization, and can mitigate many of the systemic privacy risks and costs re… ▽ More

    Submitted 8 March, 2021; v1 submitted 10 December, 2019; originally announced December 2019.

    Comments: Published in Foundations and Trends in Machine Learning Vol 4 Issue 1. See: https://www.nowpublishers.com/article/Details/MAL-083

  3. arXiv:1905.10862  [pdf, other

    stat.ML cs.LG

    Automatic Discovery of Privacy-Utility Pareto Fronts

    Authors: Brendan Avent, Javier Gonzalez, Tom Diethe, Andrei Paleyes, Borja Balle

    Abstract: Differential privacy is a mathematical framework for privacy-preserving data analysis. Changing the hyperparameters of a differentially private algorithm allows one to trade off privacy and utility in a principled way. Quantifying this trade-off in advance is essential to decision-makers tasked with deciding how much privacy can be provided in a particular application while maintaining acceptable… ▽ More

    Submitted 21 July, 2020; v1 submitted 26 May, 2019; originally announced May 2019.

    Comments: Proceedings on Privacy Enhancing Technologies 2020

  4. arXiv:1811.12040  [pdf, other

    cs.CR cs.DS cs.LG

    The Power of The Hybrid Model for Mean Estimation

    Authors: Brendan Avent, Yatharth Dubey, Aleksandra Korolova

    Abstract: We explore the power of the hybrid model of differential privacy (DP), in which some users desire the guarantees of the local model of DP and others are content with receiving the trusted-curator model guarantees. In particular, we study the utility of hybrid model estimators that compute the mean of arbitrary real-valued distributions with bounded support. When the curator knows the distribution'… ▽ More

    Submitted 15 July, 2020; v1 submitted 29 November, 2018; originally announced November 2018.

    Comments: Proceedings on Privacy Enhancing Technologies 2020

  5. arXiv:1705.00831  [pdf, other

    cs.CR cs.CY cs.IR cs.LG

    BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model

    Authors: Brendan Avent, Aleksandra Korolova, David Zeber, Torgeir Hovden, Benjamin Livshits

    Abstract: We propose a hybrid model of differential privacy that considers a combination of regular and opt-in users who desire the differential privacy guarantees of the local privacy model and the trusted curator model, respectively. We demonstrate that within this model, it is possible to design a new type of blended algorithm for the task of privately computing the head of a search log. This blended app… ▽ More

    Submitted 21 November, 2019; v1 submitted 2 May, 2017; originally announced May 2017.

    Comments: Proceedings of the 26th USENIX Security Symposium (USENIX Security 17). August 16-18, 2017, Vancouver, BC. ISBN 978-1-931971-40-9

    Journal ref: Journal of Privacy and Confidentiality, Vol. 9 (2) 2019