PPGAN: Privacy-preserving Generative Adversarial Network

被引:46
|
作者
Liu, Yi [1 ]
Peng, Jialiang [1 ]
Yu, James J. Q. [2 ]
Wu, Yi [1 ]
机构
[1] Heilongjiang Univ, Sch Data Sci & Technol, Harbin, Heilongjiang, Peoples R China
[2] Southern Univ Sci & Technol, Dept Comp Sci & Engn, Shenzhen, Peoples R China
关键词
Privacy leakage; GAN; deep learning; differential privacy; moments accountant;
D O I
10.1109/ICPADS47876.2019.00150
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Generative Adversarial Network (GAN) and its variants serve as a perfect representation of the data generation model, providing researchers with a large amount of high-quality generated data. They illustrate a promising direction for research with limited data availability. When GAN learns the semantic-rich data distribution from a dataset, the density of the generated distribution tends to concentrate on the training data. Due to the gradient parameters of the deep neural network contain the data distribution of the training samples, they can easily remember the training samples. When GAN is applied to private or sensitive data, for instance, patient medical records, as private information may be leakage. To address this issue, we propose a Privacy-preserving Generative Adversarial Network (PPGAN) model, in which we achieve differential privacy in GANs by adding well-designed noise to the gradient during the model learning procedure. Besides, we introduced the Moments Accountant strategy in the PPGAN training process to improve the stability and compatibility of the model by controlling privacy loss. We also give a mathematical proof of the differential privacy discriminator. Through extensive case studies of the benchmark datasets, we demonstrate that PPGAN can generate high-quality synthetic data while retaining the required data available under a reasonable privacy budget.
引用
收藏
页码:985 / 989
页数:5
相关论文
共 50 条
  • [21] Privacy-Preserving Feature Extraction via Adversarial Training
    Ding, Xiaofeng
    Fang, Hongbiao
    Zhang, Zhilin
    Choo, Kim-Kwang Raymond
    Jin, Hai
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (04) : 1967 - 1979
  • [22] ProcessGAN: Generating Privacy-Preserving Time-Aware Process Data with Conditional Generative Adversarial Nets
    Li, Keyi
    Yang, Sen
    Sullivan, Travis m.
    Burd, Randall s.
    Marsic, Ivan
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2024, 18 (09)
  • [23] Privacy-Preserving Generative Modeling With Sliced Wasserstein Distance
    Liu, Ziniu
    Yu, Han
    Chen, Kai
    Li, Aiping
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 1011 - 1022
  • [24] A Transformer decoder-based Generative Adversarial Model with TrajLoss Function for Privacy-Preserving Trajectory Publishing
    Cao, Xiaoqian
    Yu, Juan
    Han, Jianmin
    Yao, Xin
    Lu, Jianfeng
    Peng, Hao
    2022 5TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND NATURAL LANGUAGE PROCESSING, MLNLP 2022, 2022, : 271 - 278
  • [25] GAN-DP: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing
    Qu, Youyang
    Yu, Shui
    Zhang, Jingwen
    Huynh Thi Thanh Binh
    Gao, Longxiang
    Zhou, Wanlei
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [26] Privacy-preserving Network Path Validation
    Sengupta, Binanda
    Li, Yingjiu
    Bu, Kai
    Deng, Robert H.
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2020, 20 (01)
  • [27] Privacy-preserving network flow recording
    Shebaro, Bilal
    Crandall, Jedidiah R.
    DIGITAL INVESTIGATION, 2011, 8 : S90 - S100
  • [28] Privacy-preserving indexing of documents on the network
    Bawa, Mayank
    Bayardo, Roberto J., Jr.
    Agrawal, Rakesh
    Vaidya, Jaideep
    VLDB JOURNAL, 2009, 18 (04): : 837 - 856
  • [29] Privacy-preserving indexing of documents on the network
    Mayank Bawa
    Roberto J. Bayardo
    Rakesh Agrawal
    Jaideep Vaidya
    The VLDB Journal, 2009, 18 : 837 - 856
  • [30] Privacy Leakage in Privacy-Preserving Neural Network Inference
    Wei, Mengqi
    Zhu, Wenxing
    Cui, Liangkun
    Li, Xiangxue
    Li, Qiang
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 133 - 152