INTERPRETABILITY FRAMEWORK FOR DIFFERENTIALLY PRIVATE DEEP LEARNING

    公开(公告)号:US20250036811A1

    公开(公告)日:2025-01-30

    申请号:US18904462

    申请日:2024-10-02

    Applicant: SAP SE

    Abstract: Data is received that specifies a bound for an adversarial posterior belief pc that corresponds to a likelihood to re-identify data points from the dataset based on a differentially private function output. Privacy parameters ε, δ are then calculated based on the received data that govern a differential privacy (DP) algorithm to be applied to a function to be evaluated over a dataset. The calculating is based on a ratio of probabilities distributions of different observations, which are bound by the posterior belief pc as applied to a dataset. The calculated privacy parameters are then used to apply the DP algorithm to the function over the dataset. Related apparatus, systems, techniques and articles are also described.

    DIFFERENTIAL PRIVACY AND OUTLIER DETECTION WITHIN A NON-INTERACTIVE MODEL

    公开(公告)号:US20180173894A1

    公开(公告)日:2018-06-21

    申请号:US15387052

    申请日:2016-12-21

    Applicant: SAP SE

    Abstract: A system for differential privacy is provided. In some implementations, the system performs operations comprising receiving a plurality of indices for a plurality of perturbed data points, which are anonymized versions of a plurality of unperturbed data points, wherein the plurality of indices indicate that the plurality of unperturbed data points are identified as presumed outliers. The plurality of perturbed data points can lie around a first center point and the plurality of unperturbed data points can lie around a second center point. The operations can further comprise classifying a portion of the presumed outliers as true positives and another portion of the presumed outliers as false positives, based upon differences in distances to the respective first and second center points for the perturbed and corresponding (e.g., same index) unperturbed data points. Related systems, methods, and articles of manufacture are also described.

    Tracking privacy budget with distributed ledger

    公开(公告)号:US10380366B2

    公开(公告)日:2019-08-13

    申请号:US15496403

    申请日:2017-04-25

    Applicant: SAP SE

    Abstract: Systems and methods are provided for sending a request to register a data offer from a data owner to participate in a distributed ledger, the request including information associated with the data offer and a privacy budget for the data offer, and wherein the information associated with the data offer and the privacy budget is stored in the distributed ledger and the data offer is accessible by third parties to the data owner. The systems and method further providing for receiving a request, associated with a third party computer, to access data associated with the data offer, processing a data request associated with the request to access data, based on determining that there is sufficient privacy budget to allow access to the data associated with the request to access data, to produce result data, anonymizing the result data, and updating the distributed ledger.

    PROVIDING DIFFERENTIALLY PRIVATE DATA WITH CAUSALITY PRESERVATION

    公开(公告)号:US20180322279A1

    公开(公告)日:2018-11-08

    申请号:US15701826

    申请日:2017-09-12

    Applicant: SAP SE

    Abstract: A method is disclosed for providing sanitized log data to a threat detection system. The sanitized log data is derived from a log table with continuous columns, themselves having continuous entries with continuous values. First, a retention probability parameter and an accuracy radius parameter are selected. Next, a probability distribution function is initialized with the retention probability parameter and the accuracy radius parameter. For each continuous value, the probability distribution function is applied, resulting in perturbed continuous values of a perturbed continuous columns Finally, the perturbed continuous columns are provided as the sanitized log.

    Accurately identifying members of training data in variational autoencoders by reconstruction error

    公开(公告)号:US11501172B2

    公开(公告)日:2022-11-15

    申请号:US16219645

    申请日:2018-12-13

    Applicant: SAP SE

    Abstract: A system is described that can include a machine learning model and at least one programmable processor communicatively coupled to the machine learning model. The machine learning model can receive data, generate a continuous probability distribution associated with the data, sample a latent variable from the continuous probability distribution to generate a plurality of samples, and generate reconstructed data from the plurality of samples. The at least one programmable processor can compute a reconstruction error by determining a distance between the reconstructed data and the data, and generate, based on the reconstruction error, an indication representing whether a specific record within the received data was used to train the machine learning model. Related apparatuses, methods, techniques, non-transitory computer programmable products, non-transitory machine-readable medium, articles, and other systems are also within the scope of this disclosure.

    Interpretability Framework for Differentially Private Deep Learning

    公开(公告)号:US20220138348A1

    公开(公告)日:2022-05-05

    申请号:US17086244

    申请日:2020-10-30

    Applicant: SAP SE

    Abstract: Data is received that specifies a bound for an adversarial posterior belief ρc that corresponds to a likelihood to re-identify data points from the dataset based on a differentially private function output. Privacy parameters ε, δ are then calculated based on the received data that govern a differential privacy (DP) algorithm to be applied to a function to be evaluated over a dataset. The calculating is based on a ratio of probabilities distributions of different observations, which are bound by the posterior belief ρc as applied to a dataset. The calculated privacy parameters are then used to apply the DP algorithm to the function over the dataset. Related apparatus, systems, techniques and articles are also described.

    TRACKING PRIVACY BUDGET WITH DISTRIBUTED LEDGER

    公开(公告)号:US20180307854A1

    公开(公告)日:2018-10-25

    申请号:US15496403

    申请日:2017-04-25

    Applicant: SAP SE

    CPC classification number: G06Q40/12 G06F21/6245

    Abstract: Systems and methods are provided for sending a request to register a data offer from a data owner to participate in a distributed ledger, the request including information associated with the data offer and a privacy budget for the data offer, and wherein the information associated with the data offer and the privacy budget is stored in the distributed ledger and the data offer is accessible by third parties to the data owner. The systems and method further providing for receiving a request, associated with a third party computer, to access data associated with the data offer, processing a data request associated with the request to access data, based on determining that there is sufficient privacy budget to allow access to the data associated with the request to access data, to produce result data, anonymizing the result data, and updating the distributed ledger.

    ANONYMIZATION TECHNIQUES TO PROTECT DATA
    10.
    发明申请

    公开(公告)号:US20180004978A1

    公开(公告)日:2018-01-04

    申请号:US15633830

    申请日:2017-06-27

    Applicant: SAP SE

    CPC classification number: G06F21/6254 G06F16/2457

    Abstract: A set of data is received for a data analysis. The set of data includes personal identifiable information. The set of data is anonymized to protect the privacy information. Risk rates and utility rates are determined for a number of combinations of anonymization techniques defined correspondingly for data fields from the set of data. A risk rate is related to a privacy protection failure when defining first anonymized data through applying a combination of anonymization techniques for the data fields. A utility rate is related to accuracy of the data analysis when applied over the anonymized data. Based on evaluation of the risk rates and the utility rates, one or more anonymization techniques from the number of anonymization techniques are determined. The set of data is anonymized according to a determined anonymization techniques and/or a combination thereof.

Patent Agency Ranking