Model updating method, device and equipment

A model update and model technology, applied in the information field, can solve the problem of leaking training data user privacy, and achieve the effect of avoiding privacy data leakage

Active Publication Date: 2020-05-08
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the process of machine learning, machine learning model algorithms based on data training often face the problem of leaking user privacy in training data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Model updating method, device and equipment
  • Model updating method, device and equipment
  • Model updating method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order for those skilled in the art to better understand the technical solutions in the embodiments of this specification, the technical solutions in the embodiments of this specification will be described in detail below in conjunction with the drawings in the embodiments of this specification. Obviously, the described implementation Examples are only some of the embodiments in this specification, not all of them. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments in this specification shall fall within the scope of protection.

[0030] The technical solutions provided by each embodiment of this specification will be described in detail below in conjunction with the accompanying drawings. Such as figure 1 as shown, figure 1 It is a schematic flow chart of a model updating method provided in the embodiment of this specification, and the process specifically includes the following steps:

[0031] S101. Obtain a shadow set...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a model updating method, device and equipment. According to the scheme provided by the embodiment of the invention, the method includes under the condition that a shadow set Sand a target sample are given, respectively calculating prior probabilities alpha of training samples contained in the shadow set; and sampling according to the shadow set S, and training the samplingtraining parameter distribution of the sampling model obtained when the model is trained, calculating the posterior probability P of the target sample z in the shadow set according to the training parameter distribution of the given model and the characteristic value of the target sample; evaluating whether the privacy leakage degree of the trained model for the training sample set is qualified or not according to the difference value of the posterior probability P and the prior probability alpha; and if not, changing the affiliation relationship between the target sample and the training sample set, thereby obtaining a new training sample set and performing model adjustment to avoid privacy data leakage.

Description

technical field [0001] The embodiments of this specification relate to the field of information technology, and in particular, to a model updating method, device, and equipment. Background technique [0002] In the process of machine learning, machine learning model algorithms based on data training often face the problem of leaking user privacy in training data. For example, in a membership attack against a model, the attacker of the membership attack is given a trained model and one or more specific samples, trying to determine whether the sample is used in training the model, In order to reversely try to derive the training method and recognition method of the model. [0003] Based on this, a model update scheme that can avoid privacy leakage in machine learning is needed. Contents of the invention [0004] The purpose of the embodiments of the present application is to provide a model update scheme that can avoid privacy leakage in machine learning. [0005] In orde...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06N20/00
CPCG06N20/00
Inventor 吴秉哲陈超超陈岑王力
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products