Differential Privacy May Have a Potential Optimization Effect on Some Swarm Intelligence Algorithms besides Privacy-preserving (2306.17370v1)
Abstract: Differential privacy (DP), as a promising privacy-preserving model, has attracted great interest from researchers in recent years. Currently, the study on combination of machine learning and DP is vibrant. In contrast, another widely used artificial intelligence technique, the swarm intelligence (SI) algorithm, has received little attention in the context of DP even though it also triggers privacy concerns. For this reason, this paper attempts to combine DP and SI for the first time, and proposes a general differentially private swarm intelligence algorithm framework (DPSIAF). Based on the exponential mechanism, this framework can easily develop existing SI algorithms into the private versions. As examples, we apply the proposed DPSIAF to four popular SI algorithms, and corresponding analyses demonstrate its effectiveness. More interestingly, the experimental results show that, for our private algorithms, their performance is not strictly affected by the privacy budget, and one of the private algorithms even owns better performance than its non-private version in some cases. These findings are different from the conventional cognition, which indicates the uniqueness of SI with DP. Our study may provide a new perspective on DP, and promote the synergy between metaheuristic optimization community and privacy computing community.
- M. Cho, T. Kim, I.-J. Kim, K. Lee, and S. Lee, “Relational deep feature learning for heterogeneous face recognition,” IEEE Trans. Inf. Forensic Secur., vol. 16, pp. 376–388, 2021.
- J. Jorge, A. Giménez, J. A. Silvestre-Cerdà, J. Civera, A. Sanchis, and A. Juan, “Ieee-acm trans. audio speech lang.” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 30, pp. 148–161, 2022.
- Y. Wang, X. Zhao, Z. Zhang, and L. Y. Zhang, “A collaborative filtering algorithm based on item labels and hellinger distance for sparse data,” Journal of Information Science, vol. 48, no. 6, pp. 749–766, 2022.
- J. Feng, L. T. Yang, R. Zhang, W. Qiang, and J. Chen, “Privacy preserving high-order bi-lanczos in cloud-fog computing for industrial applications,” IEEE Trans. Ind. Inform., pp. 1–1, 2020.
- H. Zhang, C. Tian, Y. Li, L. Su, N. Yang, W. X. Zhao, and J. Gao, “Data poisoning attack against recommender system using incomplete and perturbed data,” in Proc. ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., 2021, pp. 2154–2164.
- Y. Wang, Z. Liu, L. Y. Zhang, F. Pareschi, G. Setti, and G. Chen, “From chaos to pseudorandomness: A case study on the 2-D coupled map lattice,” IEEE T. Cybern., pp. 1–11, 2021.
- Z. Zhang, H. Zhu, P. Ban, Y. Wang, and L. Y. Zhang, “Buffeting chaotification model for enhancing chaos and its hardware implementation,” IEEE Trans. Ind. Electron., vol. 70, no. 3, pp. 2916–2926, 2023.
- Z. Zhang, Y. Wang, L. Y. Zhang, and H. Zhu, “A novel chaotic map constructed by geometric operations and its application,” Nonlinear Dyn., vol. 102, no. 4, pp. 2843–2858, 2020.
- J. Basilakis and B. Javadi, “Efficient parallel binary operations on homomorphic encrypted real numbers,” IEEE Trans. Emerg. Top. Comput., vol. 9, no. 1, pp. 507–519, 2021.
- A. Al Badawi, C. Jin, J. Lin, C. F. Mun, S. J. Jie, B. H. M. Tan, X. Nan, K. M. M. Aung, and V. R. Chandrasekhar, “Towards the alexnet moment for homomorphic encryption: HCNN, the first homomorphic CNN on encrypted data with GPUs,” IEEE Trans. Emerg. Top. Comput., vol. 9, no. 3, pp. 1330–1343, 2021.
- J. Chen, K. Li, and P. S. Yu, “Privacy-preserving deep learning model for decentralized VANETs using fully homomorphic encryption and blockchain,” IEEE Trans. Intell. Transp. Syst., pp. 1–10, 2021.
- B. Ghimire and D. B. Rawat, “Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things,” IEEE Internet Things J., pp. 1–1, 2022.
- B. Gu, A. Xu, Z. Huo, C. Deng, and H. Huang, “Privacy-preserving asynchronous vertical federated learning algorithms for multiparty collaborative learning,” IEEE Trans. Neural Netw. Learn. Syst., pp. 1–13, 2021.
- Q. Yang, Y. Liu, Y. Cheng, Y. Kang, T. Chen, and H. Yu, “Federated learning,” Synthesis Lectures on Artificial Intelligence and Machine Learning, vol. 13, no. 3, pp. 1–207, 2019.
- D. Wang, J. Ren, Z. Wang, X. Pang, Y. Zhang, and X. S. Shen, “Privacy-preserving streaming truth discovery in crowdsourcing with differential privacy,” IEEE. Trans. Mob. Comput., pp. 1–1, 2021.
- Z. Zheng, T. Wang, A. K. Bashir, M. Alazab, S. Mumtaz, and X. Wang, “A decentralized mechanism based on differential privacy for privacy-preserving computation in smart grid,” IEEE Trans. Comput., pp. 1–1, 2021.
- C. Ma, L. Yuan, L. Han, M. Ding, R. Bhaskar, and J. Li, “Data level privacy preserving: A stochastic perturbation approach based on differential privacy,” IEEE Trans. Knowl. Data Eng., pp. 1–1, 2021.
- M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, “Deep learning with differential privacy,” in Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, 2016, pp. 308–318.
- N. Phan, X. Wu, H. Hu, and D. Dou, “Adaptive Laplace mechanism: Differential privacy preservation in deep learning,” in 2017 IEEE International Conference on Data Mining (ICDM), 2017, pp. 385–394.
- B. Wu, S. Zhao, G. Sun, X. Zhang, Z. Su, C. Zeng, and Z. Liu, “P3SGD: Patient privacy preserving SGD for regularizing deep CNNs in pathological image classification,” in 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2019, pp. 2094–2103.
- Q. Wang, Z. Li, Q. Zou, L. Zhao, and S. Wang, “Deep domain adaptation with differential privacy,” IEEE Trans. Inf. Forensic Secur., vol. 15, pp. 3093–3106, 2020.
- X. Chen, T. Zhang, S. Shen, T. Zhu, and P. Xiong, “An optimized differential privacy scheme with reinforcement learning in VANET,” Comput. Secur., vol. 110, p. 102446, 2021.
- J.-S. Chou and T.-K. Nguyen, “Forward forecast of stock price using sliding-window metaheuristic-optimized machine-learning regression,” IEEE Trans. Ind. Inform., vol. 14, no. 7, pp. 3132–3142, Jul. 2018.
- S. , F. Blaabjerg, and H. Wang, “An overview of artificial intelligence applications for power electronics,” IEEE Trans. Power Electron., vol. 36, no. 4, pp. 4633–4658, Apr. 2021.
- S. Fong, S. Deb, and X.-s. Yang, “How meta-heuristic algorithms contribute to deep learning in the hype of big data analytics,” in Progress in intelligent computing techniques: theory, practice, and applications. Springer, 2018, pp. 3–25.
- D. Chen, X. Li, and S. Li, “A novel convolutional neural network model based on beetle antennae search optimization algorithm for computerized tomography diagnosis,” IEEE Trans. Neural Netw. Learn. Syst., pp. 1–12, 2021.
- S. Mohana and S. S. A. Mary, “Heuristics for privacy preserving data mining: An evaluation,” in 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET). IEEE, 2017, pp. 1–9.
- Y. Xie, P. Li, J. Zhang, and M. R. Ogiela, “Differential privacy distributed learning under chaotic quantum particle swarm optimization,” Computing, vol. 103, pp. 449–472, 2021.
- C. Wang, K. Ren, and J. Wang, “Secure optimization computation outsourcing in cloud computing: A case study of linear programming,” IEEE Trans. Comput., vol. 65, no. 1, pp. 216–229, 2016.
- Z.-H. Zhan, S.-H. Wu, and J. Zhang, “A new evolutionary computation framework for privacy-preserving optimization,” in 2021 13th International Conference on Advanced Computational Intelligence (ICACI), 2021, pp. 220–226.
- J. Zhang, X. Xiao, Y. Yang, Z. Zhang, and M. Winslett, “Privgene: differentially private model fitting using genetic algorithms,” in Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, 2013, pp. 665–676.
- C. Dwork, “Differential privacy: A survey of results,” in International conference on theory and applications of models of computation. Springer, 2008, pp. 1–19.
- L. Sweeney, “k-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557–570, 2002.
- C. Dwork, A. Roth et al., “The algorithmic foundations of differential privacy.” Found. Trends Theor. Comput. Sci., vol. 9, no. 3-4, pp. 211–407, 2014.
- J. Tang, G. Liu, and Q. Pan, “A review on representative swarm intelligence algorithms for solving optimization problems: Applications and trends,” IEEE-CAA J. Automatica Sin., vol. 8, no. 10, pp. 1627–1643, 2021.
- J. Kennedy and R. Eberhart, “Particle swarm optimization,” in Proceedings of ICNN’95-international conference on neural networks, vol. 4. IEEE, 1995, pp. 1942–1948.
- S. Mirjalili, S. M. Mirjalili, and A. Lewis, “Grey wolf optimizer,” Adv. Eng. Softw., vol. 69, pp. 46–61, 2014.
- S. Mirjalili and A. Lewis, “The whale optimization algorithm,” Adv. Eng. Softw., vol. 95, pp. 51–67, 2016.
- G. Dhiman and V. Kumar, “Seagull optimization algorithm: Theory and its applications for large-scale industrial engineering problems,” Knowledge-Based Syst., vol. 165, pp. 169–196, 2019.
- X. Li, Y. Chen, C. Wang, and C. Shen, “When deep learning meets differential privacy: Privacy,security, and more,” IEEE Netw., vol. 35, no. 6, pp. 148–155, Nov. 2021.
- Y. Zhao and J. Chen, “A survey on differential privacy for unstructured data content,” ACM Computing Surveys (CSUR), vol. 54, no. 10s, pp. 1–28, 2022.
- J. Kennedy, “The particle swarm: social adaptation of knowledge,” in Proceedings of 1997 IEEE International Conference on Evolutionary Computation (ICEC’97). IEEE, 1997, pp. 303–308.
- H. Wang, H. Sun, C. Li, S. Rahnamayan, and J.-s. Pan, “Diversity enhanced particle swarm optimization with neighborhood search,” Inf. Sci., vol. 223, pp. 119–135, 2013.
- A. Cavagna, A. Culla, X. Feng, I. Giardina, T. S. Grigera, W. Kion-Crosby, S. Melillo, G. Pisegna, L. Postiglione, and P. Villegas, “Marginal speed confinement resolves the conflict between correlation and control in collective behaviour,” Nat. Commun., vol. 13, no. 1, pp. 1–11, 2022.
- T. D. Little, “The millennial challenge: Modelling the agentic self in context,” International Journal of Behavioral Development, vol. 24, no. 2, pp. 149–152, 2000.
- S. Gao, Y. Yu, Y. Wang, J. Wang, J. Cheng, and M. Zhou, “Chaotic local search-based differential evolution algorithms for optimization,” IEEE Trans. Syst. Man Cybern. -Syst., vol. 51, no. 6, pp. 3954–3967, Jun. 2021.
- Y. Xu, H. Chen, J. Luo, Q. Zhang, S. Jiao, and X. Zhang, “Enhanced moth-flame optimizer with mutation strategy for global optimization,” Inf. Sci., vol. 492, pp. 181–203, Aug. 2019.
- C. Dwork, V. Feldman, M. Hardt, T. Pitassi, O. Reingold, and A. Roth, “The reusable holdout: Preserving validity in adaptive data analysis,” Science, vol. 349, no. 6248, pp. 636–638, Aug. 2015.
- L. Zhao, Q. Wang, Q. Zou, Y. Zhang, and Y. Chen, “Privacy-preserving collaborative deep learning with unreliable participants,” IEEE Trans. Inf. Forensic Secur., vol. 15, pp. 1486–1500, 2020.
- T. Lykouris, V. Syrgkanis, and É. Tardos, “Learning and efficiency in games with dynamic population,” in Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms. SIAM, 2016, pp. 120–129.