Regression Model Fitting under Differential Privacy and Model Inversion Attack

Authors: Yue Wang, Cheng Si, Xintao Wu

IJCAI 2015 | Conference PDF | Archive PDF | Plain Text | LLM Run Details

Reproducibility Variable Result LLM Response
Research Type Experimental Theoretical analysis and empirical evaluations demonstrate our approach can effectively prevent model inversion attacks and retain model utility. In our experiments, we mainly focus on the problem of releasing the logistic regression model under differential privacy against model inversion attacks. We use the Adult dataset [Lichman, 2013] to evaluate the performance of Algorithm 1 and apply five-fold cross validation for all the accuracy calculation.
Researcher Affiliation Academia Yue Wang University of North Carolina at Charlotte Charlotte, NC, USA ywang91@uncc.edu Cheng Si University of Arkansas Fayetteville, AR, USA cxs040@uark.edu Xintao Wu University of Arkansas Fayetteville, AR, USA xintaowu@uark.edu
Pseudocode Yes Algorithm 1 Functional Mechanism with Different Perturbation of Coefficients
Open Source Code No The paper does not provide an explicit statement or link for the open-source code of the described methodology.
Open Datasets Yes We use the Adult dataset [Lichman, 2013] to evaluate the performance of Algorithm 1 and apply five-fold cross validation for all the accuracy calculation.
Dataset Splits Yes We use the Adult dataset [Lichman, 2013] to evaluate the performance of Algorithm 1 and apply five-fold cross validation for all the accuracy calculation.
Hardware Specification No The paper does not provide specific hardware details (e.g., CPU, GPU models, memory) used for running the experiments.
Software Dependencies No The paper mentions general software concepts like 'logistic regression' and 'Laplace noise' but does not specify any software dependencies with version numbers.
Experiment Setup Yes In the second experiment, we set the privacy threshold ϵ = 1 and change the privacy budget ratio γ from {1, 0.5, 0.25, 0.1, 0.05, 0.025, 0.01}. Table 2 shows the corresponding ϵs and ϵn values under each γ.