Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








25,744 Hits in 4.8 sec

Privacy-guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms [article]

Bahman Moraffah, Lalitha Sankar
2016 arXiv   pre-print
This paper introduces a multi-round interaction problem with privacy constraints between two agents that observe correlated data.  ...  the K mechanisms allow for precisely composing the total privacy budget over K rounds without loss; and (ii) develops conditions under which interaction reduces the net leakage at both agents and illustrates  ...  CONCLUSION We have introduced and defined a K-round interactive privacy mechanism between two agents with correlated data.  ... 
arXiv:1610.00663v1 fatcat:nslaf5ggobgfjhwdqgzpee2mpy

Security and Privacy of Protocols and Software with Formal Methods [chapter]

Fabrizio Biondi, Axel Legay
2016 Lecture Notes in Computer Science  
Very often, large-scale data leaks remind us that the state of the art in data privacy and anonymity is severely lacking.  ...  This is the reason why we add the following property: Anonymity The user has control on what information about them is collected by the system, and can decide how it is collected and used, by whom, and  ...  Information-theoretical properties like non-interference [20, 39] can be used to prove that the communications of an agent do not leak information about the agent's secret information in any way, allowing  ... 
doi:10.1007/978-3-319-47166-2_61 fatcat:ygef2jw6dneabg7dgdskc26pz4

More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence [article]

Tianqing Zhu and Dayong Ye and Wei Wang and Wanlei Zhou and Philip S. Yu
2020 arXiv   pre-print
For this reason, differential privacy has been broadly applied in AI but to date, no study has documented which differential privacy mechanisms can or have been leveraged to overcome its issues or the  ...  It can also be used to improve security, stabilize learning, build fair models, and impose composition in selected areas of AI.  ...  Third, most of these papers involve agent interaction; and differential privacy is adopted to guarantee the privacy of interaction information.  ... 
arXiv:2008.01916v1 fatcat:ujmxv7eq6jcppndfu5shbzkdom

More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence

Tianqing Zhu, Dayong Ye, Wei Wang, Wanlei Zhou, Philip Yu
2020 IEEE Transactions on Knowledge and Data Engineering  
For this reason, differential privacy has been broadly applied in AI but to date, no study has documented which differential privacy mechanisms can or have been leveraged to overcome its issues or the  ...  It can also be used to improve security, stabilize learning, build fair models, and impose composition in selected areas of AI.  ...  Summary of multi-agent systems Third, most of these papers involve agent interaction; and differential privacy is adopted to guarantee the privacy of interaction information.  ... 
doi:10.1109/tkde.2020.3014246 fatcat:33rl6jxy5rgexpnuel5rvlkg5a

Differential Privacy in Social Networks Using Multi-Armed Bandit

Olusola T. Odeyomi
2022 IEEE Access  
Two non-stochastic multi-armed bandit algorithms are proposed. The first algorithm uses the Laplace mechanism to guarantee differential privacy against a third-party intruder.  ...  The second algorithm uses the Laplace mechanism to guarantee differential privacy against both a third-party intruder and any spying agent in the network.  ...  The first algorithm guaranteed differential privacy using the Laplace mechanism against a third-party intruder when there is no spy among the agents.  ... 
doi:10.1109/access.2022.3144084 fatcat:zchsdloe2bbyjhanklvnipcdei

Differentially Private Reinforcement Learning with Linear Function Approximation

Xingyu Zhou
2022 Abstract Proceedings of the 2022 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems  
We design two private RL algorithms that are based on value iteration and policy optimization, respectively, and show that they enjoy sub-linear regret performance while guaranteeing privacy protection  ...  Specifically, we consider MDPs with linear function approximation (in particular linear mixture MDPs) under the notion of joint differential privacy (JDP), where the RL agent is responsible for protecting  ...  To this end, differential privacy (DP) [5] has become a standard mechanism for designing interactive learning algorithms under a rigorous privacy guarantee for individual data.  ... 
doi:10.1145/3489048.3522648 fatcat:pq4hpup2ovc4zhkwji3ve44qr4

Privacy in Multi-agent Systems [article]

Yongqiang Wang
2024 arXiv   pre-print
With the increasing awareness of privacy and the deployment of legislations in various multi-agent system application domains such as power systems and intelligent transportation, the privacy protection  ...  problem for multi-agent systems is gaining increased traction in recent years.  ...  Information theoretic privacy undirected graph Gupta et al. (2019) Information theoretic privacy Nozari et al. (2017), He et al. (2018), Gao et al. (2018b), Wang et al. (2021a), Fiore and Russo (2019),  ... 
arXiv:2403.02631v1 fatcat:sidrwdancjb6tlhny26qbgmmbu

Deterministic Privacy Preservation in Static Average Consensus Problem [article]

Amir-Salar Esteki, Solmaz S. Kia
2020 arXiv   pre-print
These mechanisms however come with computational overhead, may need coordination among the agents to choose their parameters and also alter the transient response of the algorithm.  ...  In this paper we show that an alternative iterative algorithm that is proposed in the literature in the context of dynamic average consensus problem has intrinsic privacy preservation and can be used as  ...  Herein, we show that this mechanism has no contribution and the malicious agent can still derive local information asymptotically.  ... 
arXiv:2012.04213v1 fatcat:uc35e5mmvrcn5pjchgbziauat4

Budget Feasible Mechanisms in Auction Markets: Truthfulness, Diffusion and Fairness

Xiang Liu
2022 International Joint Conference on Autonomous Agents & Multiagent Systems  
where the agents may belong to different groups and the buyer wants to fairly select agents from different groups; 3) Budget feasible mechanisms in two-sided markets where there are multiple strategic  ...  neighbors via social network and the buyer wants her neighbors to further diffuse auction information to other potential sellers to improve her utility; 2) Budget feasible mechanisms with fair representation  ...  The designed mechanism should determine an allocation and a payment scheme to guarantee various desired theoretical properties like, individual rationality that the payment to each seller covers at least  ... 
dblp:conf/atal/Liu22 fatcat:a3onsniy3japrnvsv7qrcanbfy

Agree to Disagree: Subjective Fairness in Privacy-Restricted Decentralised Conflict Resolution [article]

Alex Raymond, Matthew Malencia, Guilherme Paulino-Passos, Amanda Prorok
2021 arXiv   pre-print
To enable decentralised, fairness-aware conflict resolution under privacy constraints, we have two contributions: (1) a novel interaction approach and (2) a formalism of the relationship between privacy  ...  Our proposed interaction approach is an architecture for privacy-aware explainable conflict resolution where agents engage in a dialogue of hypotheses and facts.  ...  If the agents lack full information, there cannot be any guarantee of an objectively fair outcome.  ... 
arXiv:2107.00032v1 fatcat:rbuaarzjzjenxkq4ohu72vowpy

Differentially Private Federated Combinatorial Bandits with Constraints [article]

Sambhav Solanki, Samhita Kanaparthy, Sankarshan Damle, Sujit Gujar
2022 arXiv   pre-print
Each agent would like to learn from others, but the part of the information it shares for others to learn from could be sensitive; thus, it desires its privacy.  ...  Can these agents collectively learn while keeping their sensitive information confidential by employing differential privacy? We observe that communicating can reduce the regret.  ...  P-FCB includes selecting the information that needs to be perturbed and defining communication rounds to provide strong privacy guarantees.  ... 
arXiv:2206.13192v1 fatcat:fhhofpgkcncmha7rra2gwhwxpa

Enabling Data Exchange in Two-Agent Interactive Systems Under Privacy Constraints

E. Veronica Belmega, Lalitha Sankar, H. Vincent Poor
2015 IEEE Journal on Selected Topics in Signal Processing  
This paper builds upon a recent information-theoretic result (using mutual information to measure privacy and mean-squared error to measure fidelity) that quantifies the region of achievable distortion-leakage  ...  tuples in a two-agent network.  ...  The competitive privacy information-theoretic framework introduced in [3] studies information exchange among two interconnected agents whose privacy concerns limit such data sharing, and thus, impacts  ... 
doi:10.1109/jstsp.2015.2427775 fatcat:q2x6eckknbdsvlyhvpd7jkmahy

Electronic Markets and Auctions (Dagstuhl Seminar 13461)

Yishay Mansour, Benny Moldovanu, Noam Nisan, Berthold Vöcking, Marc Herbstritt
2014 Dagstuhl Reports  
The main goal of this seminar was to study topics related to electronic markets and auctions both from the computational perspective and from a game-theoretic and economic one.  ...  Economics have been traditionally interested in markets in general and designing efficient markets mechanisms (such as auctions) in particular.  ...  The information revealed by the principal affects the incentives of the agents to explore and generate new information.  ... 
doi:10.4230/dagrep.3.11.58 dblp:journals/dagstuhl-reports/MansourMNV13 fatcat:yvkfyeeezrhhnhckygpqseqwx4

Privacy and mechanism design

Mallesh M. Pai, Aaron Roth
2013 ACM SIGecom Exchanges  
Of course, it provides us a basis for modeling agent costs for privacy, which is essential if we are to attempt mechanism design in a setting in which agents have preferences for privacy.  ...  an agent might experience because of the loss of his privacy.  ...  ., that private information can be used to price discriminate against an agent, and therefore privacy is "good" for an agent, is not reflected in models where information is revealed by strategic purchases  ... 
doi:10.1145/2509013.2509016 fatcat:m5hvdv2pg5gfvbfs2gknjzpasq

Privacy and Mechanism Design [article]

Mallesh Pai, Aaron Roth
2013 arXiv   pre-print
Of course, it provides us a basis for modeling agent costs for privacy, which is essential if we are to attempt mechanism design in a setting in which agents have preferences for privacy.  ...  an agent might experience because of the loss of his privacy.  ...  How should we model privacy costs that are not captured by information theoretic measures like differential privacy, but nevertheless seem to have real economic consequences?  ... 
arXiv:1306.2083v1 fatcat:rpgbfnwaljeknjhjivwcrldnzm
« Previous Showing results 1 — 15 out of 25,744 results