首页> 外文学位 >Beyond Worst-Case Analysis in Privacy and Clustering: Exploiting Explicit and Implicit Assumptions.
【24h】

Beyond Worst-Case Analysis in Privacy and Clustering: Exploiting Explicit and Implicit Assumptions.

机译:超越隐私和群集中的最坏情况分析:利用显式和隐式假设。

获取原文
获取原文并翻译 | 示例

摘要

This thesis can be viewed as a collection of work in differential privacy and in clustering. In its first part we discuss work aimed at preserving differential privacy in a social network, with respect to either the presence/absence of a single edge [41], or with respect to changing all edges adjacent to one node [42]. In its second part we discuss multiple clustering problems, focusing on the k-means and k-median problems. We show how to correctly cluster an instance whose optimal k-means solution either satisfies a certain stability condition [20], or is resilient to small constant metric perturbations [21], or with cluster centers that satisfy a particular separation condition [22].;Alternatively, this thesis can be viewed as an investigation of specific non-worst case analysis paradigms. The common theme among of all results composing this thesis is that they all introduce algorithms whose guarantees are meaningful only for a subset of inputs - for inputs that satisfy certain nice properties, or assumptions. These assumptions can be roughly divided into two types, which we refer to as explicit or implicit. Explicit assumptions give a very specific and quantifiable characterization of the input (e.g. clustering instances with the distance between any pair of cluster centers larger than a specific bound). On the other hand, implicit assumptions are harder to characterize. Implicit assumptions pose a certain property that the input should satisfy, due to some compelling "real-life" reasoning (e.g. justifying a particular value of k for a k-means clustering instance), and often give much leeway as to the particular structure of the input. In this thesis, we exhibit multiple examples of assumptions of both kinds, in differential privacy and clustering, and give algorithms that take advantage of these assumptions. In particular, we show how tasks that are provably hard become feasible under suitable assumptions; tasks like providing accurate answers for queries over graph while preserving privacy on the node level, or giving a c-approximation for the k-median objective for c < 1 + e--1.
机译:可以将本论文视为差异隐私和集群中工作的集合。在第一部分中,我们讨论了旨在保留社交网络中的差异性隐私的工作,涉及到是否存在单个边缘[41]或更改与一个节点相邻的所有边缘[42]。在第二部分中,我们讨论了多个聚类问题,重点是k-均值和k-中值问题。我们展示了如何正确地聚类一个实例,该实例的最优k均值解决方案要么满足某个稳定性条件[20],要么对较小的恒定度量扰动具有弹性[21],或者具有满足特定分离条件的聚类中心[22]。或者,本论文可以看作是对特定的最坏案例分析范式的研究。构成本文的所有结果中的共同主题是,它们都引入了其保证仅对一部分输入有意义的算法-对于满足某些良好特性或假设的输入。这些假设可以大致分为两种类型,我们将其称为显式或隐式。明确的假设给出了输入的非常具体且可量化的特征(例如,聚类实例,其中任何一对聚类中心之间的距离都大于特定范围)。另一方面,隐式假设很难描述。由于一些令人信服的“现实”推理(例如,为k均值聚类实例证明k的特定值是合理的),隐式假设构成了输入应满足的特定属性,并且通常会给定一定的余地输入。在本文中,我们展示了在差分隐私和聚类中这两种假设的多个示例,并给出了利用这些假设的算法。特别是,我们展示了在适当的假设下如何证明难以完成的任务变得可行;这些任务包括为图查询提供准确的答案,同时保留节点级别的隐私,或者为c <1 + e--1的k中值目标提供c逼近。

著录项

  • 作者

    Sheffet, Or.;

  • 作者单位

    Carnegie Mellon University.;

  • 授予单位 Carnegie Mellon University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2013
  • 页码 160 p.
  • 总页数 160
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:42:07

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号