当前位置:网站首页>Reading notes: Secure federated matrix factorization
Reading notes: Secure federated matrix factorization
2022-04-23 13:46:00 【Silent city of the sky】
Secure Federated Matrix Factorization
August 2020, Intelligent Systems, IEEE 2021/10/3
The article explain :
Security matrix decomposition under federated learning | 2021 WAIC Paper sharing (qq.com)
https://mp.weixin.qq.com/s/CijeQBouFEQbUVB6cwVjTw.
1. What does literature study?
- Security federation matrix decomposition , Is the gradient information uploaded by the client easy to leak? Turn over the user's private scoring information .
2. What’s the innovation?
- Simultaneous interpreting and encryption methods based on different traditional methods , Using homomorphic encryption to increase gradient security, a user level distributed matrix decomposition framework is designed .
3. What was the methodology?
- utilize SGD Matrix decomposition optimization
- Prototype implementation , utilize Paillier A prototype of encryption construction .
- Two experimental settings :
1. Upload all item Gradient of .
2. Still upload score Items Gradient of
4. What are the conclusions?
- Only the two experimental settings are compared, and the experimental results of encryption are not seen .
- item Increased consumption of time , Most of it is consumed on the server side , Still stay in theoretical analysis .
- Need to be in FullText(users upload gradients for all the items) And PartText(user only upload the gradients of the rated items) Find a balance between .
5. others
- they utilize an open source python package, python-paillier to accomplish the ecryption part in prototype system: https://github.com/n1analytics/python-paillier.
- By analyzing the code , Can answer my doubts .
Namely gradient and local Update Information used
版权声明
本文为[Silent city of the sky]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230556365980.html
边栏推荐
- Resolution: argument 'radius' is required to be an integer
- PG library checks the name
- Use of GDB
- SAP ui5 application development tutorial 72 - trial version of animation effect setting of SAP ui5 page routing
- 零拷貝技術
- On the bug of JS regular test method
- Antd design form verification
- Solve tp6 download error course not find package topthink / think with stability stable
- Part 3: docker installing MySQL container (custom port)
- OSS cloud storage management practice (polite experience)
猜你喜欢
Window analysis function last_ VALUE,FIRST_ VALUE,lag,lead
TIA博途中基于高速计数器触发中断OB40实现定点加工动作的具体方法示例
SSM project deployed in Alibaba cloud
TERSUS笔记员工信息516-Mysql查询(2个字段的时间段唯一性判断)
QT调用外部程序
【重心坐标插值、透视矫正插值】原理以及用法见解
Double pointer instrument panel reading (I)
Basic SQL query and learning
Handling of high usage of Oracle undo
Campus takeout system - "nongzhibang" wechat native cloud development applet
随机推荐
Oracle renames objects
Unified task distribution scheduling execution framework
Double pointer instrument panel reading (I)
Test the time required for Oracle library to create an index with 7 million data in a common way
Processbuilder tool class
Explanation of input components in Chapter 16
OSS cloud storage management practice (polite experience)
Leetcode? The first common node of two linked lists
Leetcode brush question 897 incremental sequential search tree
Part 3: docker installing MySQL container (custom port)
Set Jianyun x Feishu Shennuo to help the enterprise operation Department realize office automation
The difference between is and as in Oracle stored procedure
Get the attribute value difference between two different objects with reflection and annotation
At the same time, the problems of height collapse and outer margin overlap are solved
Basic SQL query and learning
Database transactions
PG library checks the name
kettle庖丁解牛第16篇之输入组件周边讲解
Oracle defines self incrementing primary keys through triggers and sequences, and sets a scheduled task to insert a piece of data into the target table every second
PG library to view the distribution keys of a table in a certain mode