Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security calculation method based on joint learning

A computing method and security technology, applied in the field of federated learning, can solve the problems of data leakage, undiscovered federated learning, technical irregularity, etc., and achieve the effects of high security value, rich statistical accuracy, and improved versatility

Pending Publication Date: 2022-08-02
ENNEW DIGITAL TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is still based on the learning process in the machine state, and cannot fully demonstrate the necessity of joint learning
[0003] Through the search of existing technologies, no benefits brought about by the practical application of joint learning have been found. Although simple joint learning is easy to be understood by the public, deep joint learning often has data leakage and data theft due to irregular technologies. Consequences of non-standard learning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security calculation method based on joint learning
  • Security calculation method based on joint learning
  • Security calculation method based on joint learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] see image 3 , the security computing method based on joint learning of the present invention is applied to the data set enhancement training in joint learning, which comprises the following steps:

[0059] Step 1: Establish a joint learning model: it consists of an encoder, a communication unit, an integration unit and a classifier.

[0060] Step 2: For each object participating in the joint participation, there is a certain number of samples, and the number of samples is received, stored, and classified into the database through the encoder, communication unit and classifier. The data is integrated in the database according to the data characteristics and marked as the first characteristic data, the second characteristic data, the Nth characteristic data;

[0061] Step 3: According to the joint training task, preprocess the input task information, identify the candidate values ​​according to the regular expression related to the task value, use the value as the trigg...

Embodiment 2

[0066] see Figure 4 , applying the joint learning-based security computing method of the present invention to the feature aggregation of the data set in joint learning, which includes the following steps:

[0067] Step 1: Establish a joint learning model: it consists of an encoder, a communication unit, an integration unit and a classifier.

[0068] Step 2: For each object participating in the joint participation, there is a certain number of samples, and the number of samples is received, stored, and classified into the database through the encoder, communication unit and classifier. The data is integrated in the database according to the data characteristics and marked as the first characteristic data, the second characteristic data, the Nth characteristic data;

[0069] Step 3: According to the joint training task, preprocess the input task information, identify the candidate values ​​according to the regular expression related to the task value, use the value as the trig...

Embodiment 3

[0074] see Figure 5 , applying the joint learning-based security computing method of the present invention to the data labeling in joint learning, which comprises the following steps:

[0075] The first step: establish a joint learning model: it consists of an encoder, a communication unit, an integration unit and a classifier.

[0076] Step 2: Each object participating in the joint has a certain number of samples, some have characteristic data samples, some have labeled data samples, and the number of samples is received, stored, and classified through the encoder, communication unit and classifier. The corresponding data is stored in the database, and the integration unit integrates and marks the data received in real time in the database according to the data characteristics as the first characteristic data, the second characteristic data, the Nth characteristic data;

[0077] Step 3: According to the joint training task, preprocess the input task information, identify the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety calculation method based on joint learning, and the method comprises the steps: building a joint learning model, importing different data of different objects into the joint learning model, carrying out the data feature extraction through a feature extraction network, and storing, two similar models are trained through an encryption algorithm according to two independent learning features which are different in object but are associated with each other, one model learns the other model, and value sharing is achieved; besides, the safety calculation method for joint learning is carried out based on an encryption state, when the two objects mutually reference the models of the opposite side for learning, privacy operation is carried out, data information of the two objects is protected, meanwhile, a confidential channel is provided for data joint learning of the two objects, the safety value is high, and the safety calculation method is suitable for popularization and application. The method is worthy of wide-range popularization and application.

Description

technical field [0001] The invention relates to the technical field of joint learning, in particular to a secure computing method based on joint learning. Background technique [0002] A typical example of joint learning is: two things repeating very close in time, and finally forming a connection in the brain, such as classical conditioning and operant conditioning belong to this type of learning. Existing applications of federated learning refer to solving machine learning problems through a series of algorithms. Their important details are different, but the basic idea is the same: although the server cannot collect data, it can collect the parameters of the model, the server coordinates the edge devices to participate in training, and each edge device has training data. Each edge device uses its own data to train a local model, and uploads its own parameters to the server encrypted or unencrypted, and the server broadcasts the collected parameters to each edge device by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06N20/00G06K9/62G06F40/30G06F16/951G06N3/04G06N3/08G06F21/60G06F21/62
CPCG06N20/00G06F40/30G06F16/951G06N3/04G06N3/08G06F21/602G06F21/6245G06F18/24
Inventor 张敏高庆
Owner ENNEW DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products