Privacy model training method

A model training and model technology, applied in the field of privacy model training, can solve problems such as security, and achieve the effect of improving security and stability

Active Publication Date: 2021-07-09
THE CHINESE UNIV OF HONG KONG SHENZHEN
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional way of distrib

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy model training method
  • Privacy model training method
  • Privacy model training method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0070] The privacy model training method provided in this application can be applied to the application environment shown in FIG. 1 . Wherein, the training server 10 and a plurality of user terminals 20 pass through the network. The training server 10 issues model training tasks based on the model to be trained. After receiving each model training task, each user terminal 20 sends a training access request when it wants to participate in the model training task. The training server 10 selects each user terminal to join the training based on the training joining request of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a privacy model training method and device, computer equipment and a storage medium. The method of one embodiment comprises the steps of issuing a model training task based on a to-be-trained model; receiving a training joining request sent by each user terminal, generating a user set according to the request time of the training joining request of each user terminal, and sending the user set to each user terminal; dividing the users in the user set into user groups; in any iteration training process, receiving a model training ciphertext which is sent by each user terminal in the user set and carries a user terminal ciphertext, a model parameter ciphertext and training iteration times; based on the user group to which each user terminal belongs, performing key aggregation processing on the user terminal ciphertext of each user terminal to obtain a key aggregation processing result; and when the key aggregation processing result passes verification, performing model aggregation processing on the model parameter ciphertext of each user terminal to obtain a model aggregation result. By adopting the method, the safety and the stability during model training can be improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method, device, computer equipment and storage medium for training a privacy model. Background technique [0002] With the development of technology in the computer field, related processing through machine learning models has increasingly become an important content in computer technology. Before using the machine learning model for processing, it is necessary to provide a sample set, and perform a model training process on the sample set to obtain the final machine learning model. In the traditional model training process, an independent device, such as a terminal or server, completes the entire training process. This single training method can easily lead to data leakage of the sample set and affect data security. For this reason, a distributed learning technology has emerged, which distributes the sample set used for training on multiple devices. In each traini...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6218G06F21/64
Inventor 孔庆磊尹峰崔曙光李文烨
Owner THE CHINESE UNIV OF HONG KONG SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products