Verifiable privacy protection single-layer perceptron batch training method

A single-layer perceptron, privacy protection technology, applied in digital data protection, computer security devices, biological neural network models, etc., can solve the problems of slow iterative convergence, inability to achieve multi-model training tasks, and model training without verification functions. , to achieve the effect of privacy protection

Active Publication Date: 2018-10-12
XIDIAN UNIV
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) The existing training model can only complete the training of one model at a time, and cannot realize the training task of multiple models;
[0005] (2) In model training, each time a sample is selected for iterative update, the iterative convergence speed is slow;
[0006] (3) The existing encryption technology can realize the privacy protection of user data, but there is currently a lack of efficient and feasible privacy protection machine learning solutions;
[0007] (4) The existing cloud server-based model training has no verification function. Since the cloud server is usually semi-trusted, the cloud server may return invalid calculation results, which may cause the training task to fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable privacy protection single-layer perceptron batch training method
  • Verifiable privacy protection single-layer perceptron batch training method
  • Verifiable privacy protection single-layer perceptron batch training method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0064] The present invention supports batch processing model training and verifiability of the returned results by the client; adopts the classic two-party security calculation method, adopts a new lightweight privacy protection model prediction method, and both participants can protect themselves privacy input information. Safety analysis can prove that the present invention has reached safety characteristics. At the same time, the performance evaluation of the scheme is realized on two real data sets, and the experimental results and analysis show that the present invention has high efficiency and practicability.

[0065] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of applying an electronic device to carry out identification and discloses a verifiable privacy protection single-layer perceptron batch training method and a mode identification system. On the basis of the same group of training samples, the training can be carried out for different modes, thereby obtaining a plurality of different training models. Ineach round of iteration, a small batch of samples instead of a sample are selected for iteration. Through utilization of a stochastic gradient descent method, a sample vector is expanded into a matrixsample for acceleration of a convergence rate of the iteration. In a training phase, a user outsources heavy computing tasks to a cloud server. The user needs to carry out encryption operation beforeuploading an input matrix. Through utilization of a stochastic permutation function and a sparse matrix blind technology, the privacy protection of user data is realized. According to the method, a verification mechanism is taken into consideration in a single-layer perceptron training scheme for the first time, the cloud server returns a wrong computing result, and the user can check the wrong computing result with a probability of 100%.

Description

technical field [0001] The invention belongs to the technical field of identification methods or devices using electronic equipment, and in particular relates to a verifiable privacy-protecting single-layer perceptron batch training method. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: Compared with 2013, the global data volume was 0.9ZT, and by 2020, the data volume will reach 15ZT. With the gradual increase in the amount of data generated by different devices, machine learning solutions have received more and more attention and applications. Machine learning can process massive amounts of data for model training; recently, machine learning has been applied in many research fields. For example: spam classification, disease diagnosis and risk assessment, etc. Machine learning consists of two phases: the training phase and the prediction phase. Given a set of training examples and corresponding output val...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06N3/04G06N99/00H04L29/06H04L29/08
CPCH04L63/0428H04L67/10G06F21/602G06N3/045
Inventor 陈晓峰张肖瑜王剑锋袁浩然
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products