首页> 外文学位 >Learning Decision Trees Through Black-Box Queries.
【24h】

Learning Decision Trees Through Black-Box Queries.

机译:通过黑匣子查询学习决策树。

获取原文
获取原文并翻译 | 示例

摘要

We investigate the information leakage in private decision tree evaluation protocols. A private decision tree evaluation protocol is a two party computation protocol in which one party p 1 holds a private input while the other party p 2 holds a private decision tree. The aim of the protocol is to securely evaluate the private decision tree on the private input and return p1 the result. By securely evaluation, we mean that after the execution of the protocol, neither p1 should learn anything about the details of the decision tree, nor p 2 should learn about p1's input.;Moreover, we evaluate the effectiveness of the well-known decision tree learning algorithm ID3 when used to attack these protocols with the aim of learning the private decision tree. We perform this task by efficiently implementing this algorithm. We run our attack and the ID3 algorithm on many random decision trees in order to experimentally compare the accuracy and efficiency of these algorithms.;In general, these protocols guarantee the privacy of a private decision tree in a single protocol execution. Every time the protocol is run, one input/output relationship of the tree is learned. We are interested to know how many runs of a private univariate decision tree evaluation protocol is needed to learn the private tree itself. Towards answering this question, we design an efficient attack against such protocols which invokes the private decision tree evaluation protocol repeatedly and on different inputs with the aim of recovering the entire tree. In order to ensure correctness and efficiency of the proposed attack, we make some assumptions on the structure of the private univariate decision tree which we aim to learn. We implement our attack algorithm to experimentally evaluate its accuracy and efficiency when run on many random decision trees.
机译:我们调查私有决策树评估协议中的信息泄漏。私有决策树评估协议是两方计算协议,其中,一方p 1持有私有输入,而另一方p 2持有私有决策树。该协议的目的是在私有输入上安全地评估私有决策树,并返回结果p1。通过安全评估,我们的意思是协议执行后,p1都不应该了解决策树的详细信息,p 2也不应该了解p1的输入。此外,我们评估众所周知的决策树的有效性。学习算法ID3在用于攻击这些协议时旨在学习私有决策树。我们通过有效地实现此算法来执行此任务。为了在实验上比较这些算法的准确性和效率,我们在许多随机决策树上运行了攻击和ID3算法。通常,这些协议可确保在单个协议执行中私有决策树的私密性。每次运行协议时,都会学习树的一个输入/输出关系。我们很想知道私有单变量决策树评估协议需要运行多少次才能学习私有树本身。为了回答这个问题,我们设计了一种针对此类协议的有效攻击,该协议可在不同的输入上反复调用私有决策树评估协议,以恢复整个树。为了确保所提出攻击的正确性和效率,我们对我们要学习的私有单变量决策树的结构进行了一些假设。我们实施攻击算法,以在许多随机决策树上运行时通过实验评估其准确性和效率。

著录项

  • 作者

    Barati, Masoud.;

  • 作者单位

    University of Calgary (Canada).;

  • 授予单位 University of Calgary (Canada).;
  • 学科 Computer Science.
  • 学位 M.Sc.
  • 年度 2012
  • 页码 118 p.
  • 总页数 118
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号