Privacy Aware Learning thumbnail
Pause
Mute
Subtitles
Playback speed
0.25
0.5
0.75
1
1.25
1.5
1.75
2
Full screen

Privacy Aware Learning

Published on Jan 16, 20134167 Views

We study statistical risk minimization problems under a version of privacy in which the data is kept confidential even from the learner. In this local privacy framework, we show sharp upper and lower

Related categories

Chapter list

Privacy Aware Learning00:00
An example (1)00:06
An example (2)00:13
Petraeus in a market00:19
Petraeus thinking00:34
Pictures Petraeus might not want shared (1)00:46
Pictures Petraeus might not want shared (2)00:49
Maybe he shouldn't share that?00:55
But I want a good image classi er01:02
Start to develop theory of learning from private data (1)01:13
Start to develop theory of learning from private data (2)01:19
Start to develop theory of learning from private data (3)01:22
Start to develop theory of learning from private data (4)01:24
Start to develop theory of learning from private data (5)01:25
Start to develop theory of learning from private data (6)01:26
Start to develop theory of learning from private data (7)01:26
Start to develop theory of learning from private data (8)01:27
Start to develop theory of learning from private data (9)01:29
Start to develop theory of learning from private data (10)01:33
Outline01:34
Tradeo ffs (1)02:14
Tradeo ffs (2)02:21
Setting (1)02:29
Example: breast cancer prediction (1)02:56
Example: breast cancer prediction (2)03:36
Example: breast cancer prediction (3)03:44
Setting (2)03:56
Formal setting (1)04:15
Formal setting (2)04:30
Formal setting (3)04:34
Formal setting (4)04:50
Formalizing privacy (1)04:55
Formalizing privacy (2)05:21
Formalizing privacy (3)05:33
Formalizing privacy (4)05:49
How do we get privacy? (1)06:11
How do we get privacy? (2)06:17
How do we get privacy? (3)06:37
Communication model (1)06:40
Communication model (2)06:50
Communication model (3)06:59
Communication model (4)07:20
Main Contributions (1)07:56
Main Contributions (2)08:11
Privacy Saddle Points (1)08:25
Privacy Saddle Points (2)09:03
Privacy Saddle Points (3)09:08
Privacy Saddle Points (4)09:16
Privacy Saddle Points (5)09:39
Privacy Saddle Points (6)09:45
Mutual information saddle point example (1)10:08
Mutual information saddle point example (2)10:23
Mutual information saddle point example (3)10:44
Example of optimal perturbation (1)10:58
Example of optimal perturbation (2)11:04
Example of optimal perturbation (3)11:17
Example of optimal perturbation (4)11:29
Example of optimal perturbation (5)11:31
Example of optimal perturbation (6)11:32
Example of optimal perturbation (7)11:38
Example of optimal perturbation (8)11:39
Statistical estimation and convergence rates 11:51
Exhibiting tradeoff s (1)12:01
Exhibiting tradeoff s (2)13:23
Exhibiting tradeoff s (3)13:29
Exhibiting tradeoff s (4)13:32
Exhibiting tradeoff s (5)13:33
Exhibiting tradeoff s (6)13:43
Exhibiting tradeoff s (7)13:47
Experimental example: breast cancer prediction13:58
Conclusions and future work (1)15:12
Conclusions and future work (2)15:29
Conclusions and future work (3)15:56
Conclusions and future work (4)16:09
Conclusions and future work (5)16:27