auc maximization
Recently Published Documents


TOTAL DOCUMENTS

38
(FIVE YEARS 17)

H-INDEX

6
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Puyu Wang ◽  
Zhenhuan Yang ◽  
Yunwen Lei ◽  
Yiming Ying ◽  
Hai Zhang

Big Data ◽  
2020 ◽  
Vol 8 (5) ◽  
pp. 391-411
Author(s):  
Akihiro Yamaguchi ◽  
Shigeru Maya ◽  
Kohei Maruchi ◽  
Ken Ueno

Author(s):  
Ioannis Bargiotas ◽  
Argyris Kalogeratos ◽  
Myrto Limnios ◽  
Pierre-Paul Vidal ◽  
Damien Ricard ◽  
...  

2020 ◽  
Vol 34 (01) ◽  
pp. 694-701
Author(s):  
Mengdi Huai ◽  
Di Wang ◽  
Chenglin Miao ◽  
Jinhui Xu ◽  
Aidong Zhang

Pairwise learning has received much attention recently as it is more capable of modeling the relative relationship between pairs of samples. Many machine learning tasks can be categorized as pairwise learning, such as AUC maximization and metric learning. Existing techniques for pairwise learning all fail to take into consideration a critical issue in their design, i.e., the protection of sensitive information in the training set. Models learned by such algorithms can implicitly memorize the details of sensitive information, which offers opportunity for malicious parties to infer it from the learned models. To address this challenging issue, in this paper, we propose several differentially private pairwise learning algorithms for both online and offline settings. Specifically, for the online setting, we first introduce a differentially private algorithm (called OnPairStrC) for strongly convex loss functions. Then, we extend this algorithm to general convex loss functions and give another differentially private algorithm (called OnPairC). For the offline setting, we also present two differentially private algorithms (called OffPairStrC and OffPairC) for strongly and general convex loss functions, respectively. These proposed algorithms can not only learn the model effectively from the data but also provide strong privacy protection guarantee for sensitive information in the training set. Extensive experiments on real-world datasets are conducted to evaluate the proposed algorithms and the experimental results support our theoretical analysis.


Author(s):  
Zhiyuan Dang ◽  
Xiang Li ◽  
Bin Gu ◽  
Cheng Deng ◽  
Heng Huang
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document