Privacy protection data processing method, device and equipment and machine learning system

A data processing and privacy protection technology, which is applied in the privacy protection field of cryptography, can solve problems such as the complexity of the calculation process, achieve the effects of reducing complexity and precision loss, improving efficiency, and improving data processing efficiency

Active Publication Date: 2020-11-27
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the computer processes these nonlinear activation function data, it usually uses the calculation method of Taylor expansion. The calculation data is exponential, and the calculation process is relatively complicated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection data processing method, device and equipment and machine learning system
  • Privacy protection data processing method, device and equipment and machine learning system
  • Privacy protection data processing method, device and equipment and machine learning system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this specification.

[0028] As mentioned above, in the current multi-party data sharing application scenario, the shared data is usually provided by multiple parties, and the data is kept locally without aggregation of clear text. In some machine learning data sharing application scenarios, many machine learning algorithms, such as logistic regression and neural networks, need to u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy protection data processing method, device and equipment and a machine learning system. In one embodiment of the method, when a data processing result of a non-linear activation function used in a machine learning algorithm needs to be obtained in a multi-party participated data sharing application scene, a lossless expression of the non-linear activation function can be used, each subitem can be cooperatively calculated by utilizing multi-party security calculation, the subitem can be prevented from being expanded into an approximate evaluation algorithm of a polynomial, the calculation complexity is reduced, and the data processing efficiency of the non-linear activation function calculated by computer equipment is improved. Moreover, the complexity and precision loss of approximate calculation of nonlinear activation functions such as Taylor expansion can be greatly reduced.

Description

technical field [0001] The embodiments of this specification belong to the technical field of privacy protection in cryptography, and in particular relate to a data processing method, device, equipment and machine learning system for privacy protection. Background technique [0002] Machine learning models can include activation functions. The activation function in some machine learning models is a transcendental function (such as a Sigmoid function), and the operations involved in the transcendental function usually include nonlinear operations such as exponential operations and trigonometric operations. When the computer processes these nonlinear activation function data, it usually uses the calculation method of Taylor expansion. The calculation data is exponential, and the calculation process is relatively complicated. [0003] In the current multi-party data sharing application scenarios, it is often necessary for multiple participants to collaborate to jointly establ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06N20/00
CPCG06F21/6218G06N20/00
Inventor 陈超超周俊王力
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products