Method for defending graph data attack by using differential privacy technology
A technology of differential privacy and graph data, which is applied in the fields of electrical digital data processing, biological neural network models, instruments, etc., to achieve the effect of convenient deployment and weakened attack effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0062] The preferred implementation method of this step is as follows:
[0063] First, the server side processes the received node characteristic data, the formula is:
[0064]
[0065] in, is the node feature data processed locally by the LDP algorithm, x′ u is the unbiased estimation result of the server on the node features, d is the dimension of the node features, m is the dimension that needs to be disturbed in the node features, each dimension of the node features is in the interval [α, β], α, β is the lower limit and upper limit of the set interval respectively; ∈ is the privacy budget selected by the server, and e is a natural constant.
[0066] The above processing is an unbiased estimation of node characteristics, and the availability of data can be maintained through the above processing.
[0067] Afterwards, differential privacy processing is performed on the edge of the node, specifically by performing differential processing on the adjacency matrix of edge...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com