Skip to main content

Showing 1–23 of 23 results for author: Mironov, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.14604  [pdf, other

    cs.LG

    Green Federated Learning

    Authors: Ashkan Yousefpour, Shen Guo, Ashish Shenoy, Sayan Ghosh, Pierre Stock, Kiwan Maeng, Schalk-Willem Krüger, Michael Rabbat, Carole-Jean Wu, Ilya Mironov

    Abstract: The rapid progress of AI is fueled by increasingly large and computationally intensive machine learning models and datasets. As a consequence, the amount of compute used in training state-of-the-art models is exponentially increasing (doubling every 10 months between 2015 and 2022), resulting in a large carbon footprint. Federated Learning (FL) - a collaborative machine learning technique for trai… ▽ More

    Submitted 1 August, 2023; v1 submitted 25 March, 2023; originally announced March 2023.

  2. arXiv:2207.12779  [pdf, other

    cs.LG cs.AI cs.DC

    Reconciling Security and Communication Efficiency in Federated Learning

    Authors: Karthik Prasad, Sayan Ghosh, Graham Cormode, Ilya Mironov, Ashkan Yousefpour, Pierre Stock

    Abstract: Cross-device Federated Learning is an increasingly popular machine learning setting to train a model by leveraging a large population of client devices with high privacy and security guarantees. However, communication efficiency remains a major bottleneck when scaling federated learning to production environments, particularly due to bandwidth constraints during uplink communication. In this paper… ▽ More

    Submitted 26 July, 2022; originally announced July 2022.

  3. arXiv:2206.03852  [pdf, other

    cs.IR cs.LG

    FEL: High Capacity Learning for Recommendation and Ranking via Federated Ensemble Learning

    Authors: Meisam Hejazinia, Dzmitry Huba, Ilias Leontiadis, Kiwan Maeng, Mani Malek, Luca Melis, Ilya Mironov, Milad Nasr, Kaikai Wang, Carole-Jean Wu

    Abstract: Federated learning (FL) has emerged as an effective approach to address consumer privacy needs. FL has been successfully applied to certain machine learning tasks, such as training smart keyboard models and keyword spotting. Despite FL's initial success, many important deep learning use cases, such as ranking and recommendation tasks, have been limited from on-device learning. One of the key chall… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

  4. arXiv:2202.07623  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Defending against Reconstruction Attacks with Rényi Differential Privacy

    Authors: Pierre Stock, Igor Shilov, Ilya Mironov, Alexandre Sablayrolles

    Abstract: Reconstruction attacks allow an adversary to regenerate data samples of the training set using access to only a trained model. It has been recently shown that simple heuristics can reconstruct data samples from language models, making this threat scenario an important aspect of model release. Differential privacy is a known solution to such attacks, but is often used with a relatively large privac… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

  5. arXiv:2109.12298  [pdf, other

    cs.LG cs.CR

    Opacus: User-Friendly Differential Privacy Library in PyTorch

    Authors: Ashkan Yousefpour, Igor Shilov, Alexandre Sablayrolles, Davide Testuggine, Karthik Prasad, Mani Malek, John Nguyen, Sayan Ghosh, Akash Bharadwaj, Jessica Zhao, Graham Cormode, Ilya Mironov

    Abstract: We introduce Opacus, a free, open-source PyTorch library for training deep learning models with differential privacy (hosted at opacus.ai). Opacus is designed for simplicity, flexibility, and speed. It provides a simple and user-friendly API, and enables machine learning practitioners to make a training pipeline private by adding as little as two lines to their code. It supports a wide variety of… ▽ More

    Submitted 22 August, 2022; v1 submitted 25 September, 2021; originally announced September 2021.

    Comments: Privacy in Machine Learning (PriML) workshop, NeurIPS 2021

  6. arXiv:2106.03408  [pdf, other

    cs.LG cs.CR

    Antipodes of Label Differential Privacy: PATE and ALIBI

    Authors: Mani Malek, Ilya Mironov, Karthik Prasad, Igor Shilov, Florian Tramèr

    Abstract: We consider the privacy-preserving machine learning (ML) setting where the trained model must satisfy differential privacy (DP) with respect to the labels of the training examples. We propose two novel approaches based on, respectively, the Laplace mechanism and the PATE framework, and demonstrate their effectiveness on standard benchmarks. While recent work by Ghazi et al. proposed Label DP sch… ▽ More

    Submitted 29 October, 2021; v1 submitted 7 June, 2021; originally announced June 2021.

    Comments: 2021 Conference on Neural Information Processing Systems (NeurIPS)

  7. arXiv:2103.01294  [pdf, other

    cs.LG cs.DS

    Wide Network Learning with Differential Privacy

    Authors: Huanyu Zhang, Ilya Mironov, Meisam Hejazinia

    Abstract: Despite intense interest and considerable effort, the current generation of neural networks suffers a significant loss of accuracy under most practically relevant privacy training regimes. One particularly challenging class of neural networks are the wide ones, such as those deployed for NLP typeahead prediction or recommender systems. Observing that these models share something in common--an embe… ▽ More

    Submitted 4 June, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

  8. arXiv:2003.04884  [pdf, other

    cs.LG cs.CR

    Cryptanalytic Extraction of Neural Network Models

    Authors: Nicholas Carlini, Matthew Jagielski, Ilya Mironov

    Abstract: We argue that the machine learning problem of model extraction is actually a cryptanalytic problem in disguise, and should be studied as such. Given oracle access to a neural network, we introduce a differential attack that can efficiently steal the parameters of the remote model up to floating point precision. Our attack relies on the fact that ReLU neural networks are piecewise linear functions,… ▽ More

    Submitted 22 July, 2020; v1 submitted 10 March, 2020; originally announced March 2020.

  9. arXiv:2001.03618  [pdf, other

    cs.CR

    Encode, Shuffle, Analyze Privacy Revisited: Formalizations and Empirical Evaluation

    Authors: Úlfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Shuang Song, Kunal Talwar, Abhradeep Thakurta

    Abstract: Recently, a number of approaches and techniques have been introduced for reporting software statistics with strong privacy guarantees. These range from abstract algorithms to comprehensive systems with varying assumptions and built upon local differential privacy mechanisms and anonymity. Based on the Encode-Shuffle-Analyze (ESA) framework, notable results formally clarified large improvements in… ▽ More

    Submitted 10 January, 2020; originally announced January 2020.

  10. arXiv:1908.10530  [pdf, other

    cs.LG cs.CR stat.ML

    Rényi Differential Privacy of the Sampled Gaussian Mechanism

    Authors: Ilya Mironov, Kunal Talwar, Li Zhang

    Abstract: The Sampled Gaussian Mechanism (SGM)---a composition of subsampling and the additive Gaussian noise---has been successfully used in a number of machine learning applications. The mechanism's unexpected power is derived from privacy amplification by sampling where the privacy cost of a single evaluation diminishes quadratically, rather than linearly, with the sampling rate. Characterizing the preci… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: 14 pages

  11. arXiv:1908.03566  [pdf, other

    cs.LG cs.AI cs.CR

    That which we call private

    Authors: Úlfar Erlingsson, Ilya Mironov, Ananth Raghunathan, Shuang Song

    Abstract: The guarantees of security and privacy defenses are often strengthened by relaxing the assumptions made about attackers or the context in which defenses are deployed. Such relaxations can be a highly worthwhile topic of exploration---even though they typically entail assuming a weaker, less powerful adversary---because there may indeed be great variability in both attackers' powers and their conte… ▽ More

    Submitted 20 April, 2020; v1 submitted 8 August, 2019; originally announced August 2019.

  12. arXiv:1812.06210  [pdf, ps, other

    cs.LG stat.ML

    A General Approach to Adding Differential Privacy to Iterative Training Procedures

    Authors: H. Brendan McMahan, Galen Andrew, Ulfar Erlingsson, Steve Chien, Ilya Mironov, Nicolas Papernot, Peter Kairouz

    Abstract: In this work we address the practical challenges of training machine learning models on privacy-sensitive datasets by introducing a modular approach that minimizes changes to training algorithms, provides a variety of configuration strategies for the privacy mechanism, and then isolates and simplifies the critical logic that computes the final privacy guarantees. A key challenge is that training a… ▽ More

    Submitted 4 March, 2019; v1 submitted 14 December, 2018; originally announced December 2018.

    Comments: Presented at NeurIPS 2018 workshop on Privacy Preserving Machine Learning; Companion paper to TensorFlow Privacy OSS Library

  13. arXiv:1811.12469  [pdf, other

    cs.LG cs.CR cs.DS stat.ML

    Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity

    Authors: Úlfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Abhradeep Thakurta

    Abstract: Sensitive statistics are often collected across sets of users, with repeated collection of reports done over time. For example, trends in users' private preferences or software usage may be monitored via such reports. We study the collection of such statistics in the local differential privacy (LDP) model, and describe an algorithm whose privacy cost is polylogarithmic in the number of changes to… ▽ More

    Submitted 25 July, 2020; v1 submitted 29 November, 2018; originally announced November 2018.

    Comments: Stated amplification bounds for epsilon > 1 explicitly and also stated the bounds for for Renyi DP. Fixed an incorrect statement in one of the proofs

  14. arXiv:1808.06651  [pdf, other

    cs.LG cs.CR cs.DS stat.ML

    Privacy Amplification by Iteration

    Authors: Vitaly Feldman, Ilya Mironov, Kunal Talwar, Abhradeep Thakurta

    Abstract: Many commonly used learning algorithms work by iteratively updating an intermediate solution using one or a few data points in each iteration. Analysis of differential privacy for such algorithms often involves ensuring privacy of each step and then reasoning about the cumulative privacy cost of the algorithm. This is enabled by composition theorems for differential privacy that allow releasing of… ▽ More

    Submitted 10 December, 2018; v1 submitted 20 August, 2018; originally announced August 2018.

    Comments: Extended abstract appears in Foundations of Computer Science (FOCS) 2018

  15. arXiv:1802.08908  [pdf, other

    stat.ML cs.CR cs.LG

    Scalable Private Learning with PATE

    Authors: Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Úlfar Erlingsson

    Abstract: The rapid adoption of machine learning has increased concerns about the privacy implications of machine learning models trained on sensitive data, such as medical records or other personal information. To address those concerns, one promising approach is Private Aggregation of Teacher Ensembles, or PATE, which transfers to a "student" model the knowledge of an ensemble of "teacher" models, with in… ▽ More

    Submitted 24 February, 2018; originally announced February 2018.

    Comments: Published as a conference paper at ICLR 2018

  16. Prochlo: Strong Privacy for Analytics in the Crowd

    Authors: Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Usharsee Kode, Julien Tinnes, Bernhard Seefeld

    Abstract: The large-scale monitoring of computer users' software activities has become commonplace, e.g., for application telemetry, error reporting, or demographic profiling. This paper describes a principled systems architecture---Encode, Shuffle, Analyze (ESA)---for performing such monitoring with high utility while also protecting user privacy. The ESA design, and its Prochlo implementation, are informe… ▽ More

    Submitted 2 October, 2017; originally announced October 2017.

    Journal ref: Proceedings of the 26th Symposium on Operating Systems Principles (SOSP), pp. 441-459, 2017

  17. arXiv:1709.07553  [pdf, ps, other

    cs.CR

    Oblivious Stash Shuffle

    Authors: Petros Maniatis, Ilya Mironov, Kunal Talwar

    Abstract: This is a companion report to Bittau et al. We restate and prove security of the Stash Shuffle.

    Submitted 25 September, 2017; v1 submitted 21 September, 2017; originally announced September 2017.

  18. arXiv:1708.08022  [pdf, ps, other

    stat.ML cs.CR cs.LG

    On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches

    Authors: Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang

    Abstract: The recent, remarkable growth of machine learning has led to intense interest in the privacy of the data on which machine learning relies, and to new techniques for preserving privacy. However, older ideas about privacy may well remain valid and useful. This note reviews two recent works on privacy in the light of the wisdom of some of the early literature, in particular the principles distilled b… ▽ More

    Submitted 26 August, 2017; originally announced August 2017.

    Journal ref: IEEE 30th Computer Security Foundations Symposium (CSF), pages 1--6, 2017

  19. Renyi Differential Privacy

    Authors: Ilya Mironov

    Abstract: We propose a natural relaxation of differential privacy based on the Renyi divergence. Closely related notions have appeared in several recent papers that analyzed composition of differentially private mechanisms. We argue that the useful analytical tool can be used as a privacy definition, compactly and accurately representing guarantees on the tails of the privacy loss. We demonstrate that the… ▽ More

    Submitted 25 August, 2017; v1 submitted 24 February, 2017; originally announced February 2017.

    Journal ref: Proceedings of IEEE 30th Computer Security Foundations Symposium CSF 2017, pages 263-275, IEEE, Aug 2017

  20. arXiv:1607.00133  [pdf, other

    stat.ML cs.CR cs.LG

    Deep Learning with Differential Privacy

    Authors: Martín Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang

    Abstract: Machine learning techniques based on neural networks are achieving remarkable results in a wide variety of domains. Often, the training of models requires large, representative datasets, which may be crowdsourced and contain sensitive information. The models should not expose private information in these datasets. Addressing this goal, we develop new algorithmic techniques for learning and a refin… ▽ More

    Submitted 24 October, 2016; v1 submitted 1 July, 2016; originally announced July 2016.

    Journal ref: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), pp. 308-318, 2016

  21. arXiv:1204.2606  [pdf, ps, other

    cs.DS cs.CY cs.DB cs.SI

    Privacy via the Johnson-Lindenstrauss Transform

    Authors: Krishnaram Kenthapadi, Aleksandra Korolova, Ilya Mironov, Nina Mishra

    Abstract: Suppose that party A collects private information about its users, where each user's data is represented as a bit vector. Suppose that party B has a proprietary data mining algorithm that requires estimating the distance between users, such as clustering or nearest neighbors. We ask if it is possible for party A to publish some information about each user so that B can estimate the distance betwee… ▽ More

    Submitted 11 April, 2012; originally announced April 2012.

    Comments: 24 pages

    ACM Class: K.4.1; F.2; H.3.5; G.3; I.5.3; H.3.3; H.2.8; E.1; G.1.3

    Journal ref: Journal of Privacy and Confidentiality, Volume 5, Issue 1, Pages 39-71, 2013

  22. arXiv:cs/0610048  [pdf, ps, other

    cs.CR cs.DM math.CO

    MV3: A new word based stream cipher using rapid mixing and revolving buffers

    Authors: Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan

    Abstract: MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new components and principles, as well as mathematical analysis to justify their use. Our approach, like RC4's, is based on rapidly mixing random w… ▽ More

    Submitted 9 October, 2006; originally announced October 2006.

    Comments: 27 pages, shortened version will appear in "Topics in Cryptology - CT-RSA 2007"

  23. Hard Instances of the Constrained Discrete Logarithm Problem

    Authors: Ilya Mironov, Anton Mityagin, Kobbi Nissim

    Abstract: The discrete logarithm problem (DLP) generalizes to the constrained DLP, where the secret exponent $x$ belongs to a set known to the attacker. The complexity of generic algorithms for solving the constrained DLP depends on the choice of the set. Motivated by cryptographic applications, we study sets with succinct representation for which the constrained DLP is hard. We draw on earlier results du… ▽ More

    Submitted 23 July, 2006; v1 submitted 29 June, 2006; originally announced June 2006.

    MSC Class: 11B50 (primary) 11B13; 05B40; 51A30; 94A60 (secondary)

    Journal ref: In proceedings of 7th Algorithmic Number Theory Symposium (ANTS VII), pages 582--598, 2006