Method and device for multi-party joint training neural network for security defense

A neural network and security defense technology, applied in the field of information security, can solve problems such as time-consuming, occupation, and large computing resources

Active Publication Date: 2021-02-12
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the cumbersome data processing, the modeling efficiency is not good
Especially when the model uses a neural network, because the model parameters are often large, the model training takes up a lot of computing resources and takes a lot of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for multi-party joint training neural network for security defense
  • Method and device for multi-party joint training neural network for security defense
  • Method and device for multi-party joint training neural network for security defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0034] As mentioned above, in order to ensure data security, encryption technology is usually used to process data during the collaborative modeling process of multiple data holders (hereinafter referred to as data parties), resulting in a large amount of computing resources and a lot of time. The computing resources consumed in the training neural network scenario are particularly huge.

[0035] In this regard, the inventor proposes a method for joint training of neural networks by multiple parties. In this method, besides multiple data parties, the multiple parties also include neutral servers that do not individually belong to any data party. In one embodiment, figure 1 An architecture diagram of a neural network jointly deployed by multiple parties is shown, which includes M clients corresponding to M data parties, and a neutral server. Further, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of this specification provides a multi-party joint training neural network method for security defense, where the multi-party includes multiple clients corresponding to multiple data parties and a neutral server. Multiple clients use the secure multi-party technology MPC to jointly calculate one or more hidden layers on the basis of protecting data privacy, and then place the calculated hidden layers on a neutral server to perform other complex neural network calculations. In order to obtain the prediction result, it is used to compare with the sample label to determine the prediction loss. In addition, attacker models that simulate attackers are deployed in multiple clients, and attacker losses are calculated separately. Furthermore, the server adjusts the parameters of the rest of the complex neural network deployed on it according to the training loss determined based on the prediction loss and the attacker's loss, and multiple clients adjust the corresponding part of the parameters of the common computing hidden layer maintained by each according to the training loss, and adjust the parameters of the attacker model according to the attacker loss.

Description

technical field [0001] One or more embodiments of this specification relate to the field of information security technology, and in particular to a method and device for multi-party joint training of neural networks for security defense. Background technique [0002] At present, the collaborative training of machine learning models by multiple data parties has sparked a research boom. The difficulty lies in how to ensure the security of the data of all parties during the training process. For example, the payment platform has some characteristics and labels of users, and the bank has other characteristics of users. At this time, the payment platform and the bank hope to use the data of both parties to jointly build a machine learning model. However, due to the existence of laws and regulations on data security, or the unwillingness of both parties to disclose the data to the other party, it is necessary to jointly model in a form that can guarantee their own data security. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06N3/08G06N3/04
CPCG06N3/08G06N3/045
Inventor 陈超超王力周俊
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products