SlideShare a Scribd company logo
1 of 34
Differential Privacy
And Machine Learning
Aaron Roth
March 24, 2017
Protecting Privacy is Important
Class action lawsuit accuses AOL of violating the Electronic Communications
Privacy Act, seeks $5,000 in damages per user. AOL’s director of research is fired.
Protecting Privacy is Important
Class action lawsuit (Doe v. Netflix) accuses Netflix of violating the Video Privacy
Protection Act, seeks $2,000 in compensation for each of Netflix’s 2,000,000
subscribers. Settled for undisclosed sum, 2nd Netflix Challenge is cancelled.
Protecting Privacy is Important
The National Human Genome Research Institute (NHGRI) immediately restricted
pooled genomic data that had previously been publically available.
So What is Differential Privacy?
So What is Differential Privacy?
β€’ Differential Privacy is about promising people freedom from
harm.
β€œAn analysis of a dataset D is differentially private if the data analyst
knows almost no more about Alice after the analysis than he would
have known had he conducted the same analysis on an identical data
set with Alice’s data removed.”
D
Differential Privacy
[Dwork-McSherry-Nissim-Smith 06]
Algorithm
Pr [r]
ratio bounded
Alice Bob Chris Donna ErnieXavier
Differential Privacy
𝑋: The data universe.
𝐷 βŠ‚ 𝑋: The dataset (one element per person)
Definition: Two datasets 𝐷, 𝐷′
βŠ‚ 𝑋 are
neighbors if they differ in the data of a single
individual.
Differential Privacy
𝑋: The data universe.
𝐷 βŠ‚ 𝑋: The dataset (one element per person)
Definition: An algorithm 𝑀 is πœ–-differentially
private if for all pairs of neighboring datasets
𝐷, 𝐷′
, and for all outputs x:
Pr 𝑀 𝐷 = π‘₯ ≀ (1 + πœ–) Pr 𝑀 𝐷′
= π‘₯
Some Useful Properties
Theorem (Postprocessing): If 𝑀(𝐷) is πœ–-private, and 𝑓 is any
(randomized) function, then 𝑓(𝑀 𝐷 ) is πœ–-private.
So…
π‘₯ =
Definition: An algorithm 𝑀 is πœ–-differentially
private if for all pairs of neighboring datasets
𝐷, 𝐷′
, and for all outputs x:
Pr 𝑀 𝐷 = π‘₯ ≀ (1 + πœ–) Pr 𝑀 𝐷′
= π‘₯
So…
π‘₯ =
Definition: An algorithm 𝑀 is πœ–-differentially
private if for all pairs of neighboring datasets
𝐷, 𝐷′
, and for all outputs x:
Pr 𝑀 𝐷 = π‘₯ ≀ (1 + πœ–) Pr 𝑀 𝐷′
= π‘₯
So…
π‘₯ =
Definition: An algorithm 𝑀 is πœ–-differentially
private if for all pairs of neighboring datasets
𝐷, 𝐷′
, and for all outputs x:
Pr 𝑀 𝐷 = π‘₯ ≀ (1 + πœ–) Pr 𝑀 𝐷′
= π‘₯
Some Useful Properties
Theorem (Composition): If 𝑀1, … , 𝑀 π‘˜
are πœ–-private, then:
𝑀 𝐷 ≑ (𝑀1 𝐷 , … , 𝑀 π‘˜ 𝐷 )
is π‘˜πœ–-private.
So…
You can go about designing algorithms as you normally would.
Just access the data using differentially private β€œsubroutines”,
and keep track of your β€œprivacy budget” as a resource.
Private algorithm design, like regular algorithm design, can be
modular.
Some simple operations:
Answering Numeric Queries
Def: A numeric function 𝑓 has sensitivity 𝑐 if for all neighboring
𝐷, 𝐷′
:
𝑓 𝐷 βˆ’ 𝑓 𝐷′
≀ 𝑐
Write 𝑠 𝑓 ≑ 𝑐
β€’ e.g. β€œHow many software engineers are in the room?” has
sensitivity 1.
β€’ β€œWhat fraction of people in the room are software engineers?”
has sensitivity
1
𝑛
.
Some simple operations:
Answering Numeric Queries
The Laplace Mechanism:
π‘€πΏπ‘Žπ‘ 𝐷, 𝑓, πœ– = 𝑓 𝐷 + πΏπ‘Žπ‘
𝑠 𝑓
πœ–
Theorem: π‘€πΏπ‘Žπ‘(β‹…, 𝑓, πœ–) is πœ–-private.
Some simple operations:
Answering Numeric Queries
The Laplace Mechanism:
π‘€πΏπ‘Žπ‘ 𝐷, 𝑓, πœ– = 𝑓 𝐷 + πΏπ‘Žπ‘
𝑠 𝑓
πœ–
Theorem: The expected error is
𝑠 𝑓
πœ–
(can answer β€œwhat fraction of people in the room are software
engineers?” with error 0.2%)
Some simple operations:
Answering Non-numeric Queries
β€œWhat is the modal eye color in the room?”
𝑅 = {Blue, Green, Brown, Red}
β€’ If you can define a function that determines how β€œgood” each
outcome is for a fixed input:
– E.g.
π‘ž 𝐷, Red =β€œfraction of people in D with red eyes”
Some simple operations:
Answering Non-numeric Queries
𝑀 𝐸π‘₯𝑝(𝐷, 𝑅, π‘ž, πœ–):
Output π‘Ÿ ∈ 𝑅 w.p. ∝ 𝑒2πœ–β‹…π‘ž 𝐷,π‘Ÿ
Theorem: 𝑀 𝐸π‘₯𝑝(𝐷, 𝑅, π‘ž, πœ–) is 𝑠 π‘ž β‹… πœ–-private, and outputs π‘Ÿ ∈ 𝑅 such
that:
𝐸 π‘ž 𝐷, π‘Ÿ βˆ’ max
π‘Ÿβˆ—βˆˆπ‘…
π‘ž 𝐷, π‘Ÿβˆ—
≀
2𝑠 π‘ž
πœ–
β‹… ln 𝑅
(can find a color that has frequency within 0.5% of the modal color in
the room)
So what can we do with that?
Empirical Risk Minimization:
*i.e. almost all of supervised learning
Find πœƒ to minimize:
𝐿 πœƒ =
𝑖=1
𝑛
β„“ πœƒ, π‘₯𝑖, 𝑦𝑖
So what can we do with that?
Empirical Risk Minimization:
Simple Special Case: Linear Regression
Find πœƒ ∈ 𝑅 𝑑
to minimize:
𝑖=1
𝑛
πœƒ, π‘₯𝑖 βˆ’ 𝑦𝑖
2
So what can we do with that?
β€’ First Attempt: Try the exponential mechanism!
β€’ Define π‘ž πœƒ, 𝐷 = βˆ’ π‘‹πœƒ βˆ’ 𝑦 𝑇
(π‘‹πœƒ βˆ’ 𝑦)
β€’ Output πœƒ ∈ ℝ 𝑑
w.p. ∝ 𝑒2πœ–π‘ž(πœƒ,𝐷)
– How?
β€’ In this case, reduces to:
Output πœƒβˆ—
+ 𝑁 0,
𝑋 𝑇 𝑋
βˆ’1
2πœ–
Where πœƒβˆ—
= arg min 𝑖=1
𝑛
πœƒ, π‘₯𝑖 βˆ’ 𝑦𝑖
2
So what can we do with that?
Empirical Risk Minimization:
The General Case (e.g. deep learning)
Find πœƒ to minimize:
𝐿 πœƒ =
𝑖=1
𝑛
β„“ πœƒ, π‘₯𝑖, 𝑦𝑖
Stochastic Gradient Descent
Convergence depends on the fact that at each round: 𝔼 𝑔𝑑 = 𝛻L(πœƒ)
Let πœƒ1 = 0 𝑑
For 𝑑 = 1 to 𝑇:
Pick 𝑖 at random. Let 𝑔𝑑 ← 𝛻ℓ πœƒ 𝑑, π‘₯𝑖, 𝑦𝑖
Let πœƒ 𝑑+1 ← πœƒ 𝑑 βˆ’ πœ‚ β‹… 𝑔𝑑
Private Stochastic Gradient Descent
Still have: 𝔼 𝑔𝑑 = 𝛻L πœƒ !
(Can still prove convergence theorems, and run the algorithm…)
Privacy guarantees can be computed from:
1) The privacy of the Laplace mechanism
2) Preservation of privacy under post-processing, and
3) Composition of privacy guarantees.
Let πœƒ1 = 0 𝑑
For 𝑑 = 1 to 𝑇:
Pick 𝑖 at random. Let 𝑔𝑑 ← 𝛻ℓ πœƒ 𝑑, π‘₯𝑖, 𝑦𝑖 + πΏπ‘Žπ‘ 𝜎 𝑑
Let πœƒ 𝑑+1 ← πœƒ 𝑑 βˆ’ πœ‚ β‹… 𝑔𝑑
What else can we do?
β€’ Statistical Estimation
β€’ Graph Analysis
β€’ Combinatorial Optimization
β€’ Spectral Analysis of Matrices
β€’ Anomaly Detection/Analysis of Data Streams
β€’ Convex Optimization
β€’ Equilibrium computation
β€’ Computation of optimal 1-sided and 2-sided matchings
β€’ Pareto Optimal Exchanges
β€’ …
Differential Privacy β‡’ Learning
Theorem*: An πœ–-differentially private algorithm cannot overfit its
training set by more than πœ–.
*Lots of interesting details missing! See our paper in Science.
from numpy import *
def Thresholdout(sample, holdout, q, sigma, threshold):
sample_mean = mean([q(x) for x in sample])
holdout_mean = mean([q(x) for x in holdout])
if (abs(sample_mean - holdout_mean)
< random.normal(threshold, sigma)):
# q does not overfit
return sample_mean
else:
# q overfits
return holdout_mean + random.normal(0, sigma)
thresholdout.py:
Thresholdout [DFHPRR15]
Reusable holdout example
β€’ Data set with 2n = 20,000 rows and d = 10,000
variables. Class labels in {-1,1}
β€’ Analyst performs stepwise variable selection:
1. Split data into training/holdout of size n
2. Select β€œbest” k variables on training data
3. Only use variables also good on holdout
4. Build linear predictor out of k variables
5. Find best k = 10,20,30,…
Classification after feature selection
No signal: data are random gaussians
labels are drawn independently at random from {-1,1}
Thresholdout correctly detects overfitting!
Strong signal: 20 features are mildly correlated with target
remaining attributes are uncorrelated
Thresholdout correctly detects right model size!
Classification after feature selection
So…
β€’ Differential privacy provides:
– A rigorous, provable guarantee with a strong privacy semantics.
– A set of tools and composition theorems that allow for modular, easy
design of privacy preserving algorithms.
– Protection against overfitting even when privacy is not a concern.
Thanks!
To learn more:
β€’ Our textbook on differential privacy:
– Available for free on my website: http://www.cis.upenn.edu/~aaroth
β€’ Connections between Privacy and Overfitting:
– Dwork, Feldman, Hardt, Pitassi, Reingold, Roth, β€œThe Reusable Holdout: Preserving Validity in Adaptive Data Analysis”,
Science, August 7 2015.
– Dwork, Feldman, Hardt, Pitassi, Reingold, Roth, β€œPreserving Statistical Validity in Adaptive Data Analysis”, STOC 2015.
– Bassily, Nissim, Stemmer, Smith, Steinke, Ullman, β€œAlgorithmic Stability for Adaptive Data Analysis”, STOC 2016.
– Rogers, Roth, Smith, Thakkar, β€œMax Information, Differential Privacy, and Post-Selection Hypothesis Testing”, FOCS 2016.
– Cummings, Ligett, Nissim, Roth, Wu, β€œAdaptive Learning with Robust Generalization Guarantees”, COLT 2016.

More Related Content

What's hot

MapReduce Example | MapReduce Programming | Hadoop MapReduce Tutorial | Edureka
MapReduce Example | MapReduce Programming | Hadoop MapReduce Tutorial | Edureka MapReduce Example | MapReduce Programming | Hadoop MapReduce Tutorial | Edureka
MapReduce Example | MapReduce Programming | Hadoop MapReduce Tutorial | Edureka Edureka!
Β 
File systems versus a dbms
File systems versus a dbmsFile systems versus a dbms
File systems versus a dbmsRituBhargava7
Β 
Map reduce presentation
Map reduce presentationMap reduce presentation
Map reduce presentationateeq ateeq
Β 
Common Factor Attack on RSA
Common Factor Attack on RSACommon Factor Attack on RSA
Common Factor Attack on RSAVineet Kumar
Β 
Operating system - Deadlock
Operating system - DeadlockOperating system - Deadlock
Operating system - DeadlockShashank Yenurkar
Β 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsaMazin Alwaaly
Β 
Graph and RDF databases
Graph and RDF databasesGraph and RDF databases
Graph and RDF databasesNassim Bahri
Β 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Velocidex Enterprises
Β 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
Β 
Server system architecture
Server system architectureServer system architecture
Server system architectureFaiza Hafeez
Β 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentTeymur Kheirkhabarov
Β 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryptionsecurityxploded
Β 
Big Data Analytics with Spark
Big Data Analytics with SparkBig Data Analytics with Spark
Big Data Analytics with SparkMohammed Guller
Β 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management SystemAAKANKSHA JAIN
Β 

What's hot (20)

HDFS Design Principles
HDFS Design PrinciplesHDFS Design Principles
HDFS Design Principles
Β 
MapReduce Example | MapReduce Programming | Hadoop MapReduce Tutorial | Edureka
MapReduce Example | MapReduce Programming | Hadoop MapReduce Tutorial | Edureka MapReduce Example | MapReduce Programming | Hadoop MapReduce Tutorial | Edureka
MapReduce Example | MapReduce Programming | Hadoop MapReduce Tutorial | Edureka
Β 
Ch9
Ch9Ch9
Ch9
Β 
File systems versus a dbms
File systems versus a dbmsFile systems versus a dbms
File systems versus a dbms
Β 
Map reduce presentation
Map reduce presentationMap reduce presentation
Map reduce presentation
Β 
Common Factor Attack on RSA
Common Factor Attack on RSACommon Factor Attack on RSA
Common Factor Attack on RSA
Β 
Operating system - Deadlock
Operating system - DeadlockOperating system - Deadlock
Operating system - Deadlock
Β 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
Β 
Hadoop Map Reduce
Hadoop Map ReduceHadoop Map Reduce
Hadoop Map Reduce
Β 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
Β 
Graph and RDF databases
Graph and RDF databasesGraph and RDF databases
Graph and RDF databases
Β 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3
Β 
Map Reduce
Map ReduceMap Reduce
Map Reduce
Β 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
Β 
Server system architecture
Server system architectureServer system architecture
Server system architecture
Β 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
Β 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
Β 
Big Data Analytics with Spark
Big Data Analytics with SparkBig Data Analytics with Spark
Big Data Analytics with Spark
Β 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
Β 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Β 

Viewers also liked

Ben Lau, Quantitative Researcher, Hobbyist, at MLconf NYC 2017
Ben Lau, Quantitative Researcher, Hobbyist, at MLconf NYC 2017Ben Lau, Quantitative Researcher, Hobbyist, at MLconf NYC 2017
Ben Lau, Quantitative Researcher, Hobbyist, at MLconf NYC 2017MLconf
Β 
Stephanie deWet, Software Engineer, Pinterest at MLconf SF 2016
Stephanie deWet, Software Engineer, Pinterest at MLconf SF 2016Stephanie deWet, Software Engineer, Pinterest at MLconf SF 2016
Stephanie deWet, Software Engineer, Pinterest at MLconf SF 2016MLconf
Β 
Jeff Bradshaw, Founder, Adaptris
Jeff Bradshaw, Founder, AdaptrisJeff Bradshaw, Founder, Adaptris
Jeff Bradshaw, Founder, AdaptrisMLconf
Β 
Chris Fregly, Research Scientist, PipelineIO at MLconf ATL 2016
Chris Fregly, Research Scientist, PipelineIO at MLconf ATL 2016Chris Fregly, Research Scientist, PipelineIO at MLconf ATL 2016
Chris Fregly, Research Scientist, PipelineIO at MLconf ATL 2016MLconf
Β 
Caroline Sinders, Online Harassment Researcher, Wikimedia at The AI Conferenc...
Caroline Sinders, Online Harassment Researcher, Wikimedia at The AI Conferenc...Caroline Sinders, Online Harassment Researcher, Wikimedia at The AI Conferenc...
Caroline Sinders, Online Harassment Researcher, Wikimedia at The AI Conferenc...MLconf
Β 
Virginia Smith, Researcher, UC Berkeley at MLconf SF 2016
Virginia Smith, Researcher, UC Berkeley at MLconf SF 2016Virginia Smith, Researcher, UC Berkeley at MLconf SF 2016
Virginia Smith, Researcher, UC Berkeley at MLconf SF 2016MLconf
Β 
Alex Smola, Director of Machine Learning, AWS/Amazon, at MLconf SF 2016
Alex Smola, Director of Machine Learning, AWS/Amazon, at MLconf SF 2016Alex Smola, Director of Machine Learning, AWS/Amazon, at MLconf SF 2016
Alex Smola, Director of Machine Learning, AWS/Amazon, at MLconf SF 2016MLconf
Β 
Brian Lucena, Senior Data Scientist, Metis at MLconf SF 2016
Brian Lucena, Senior Data Scientist, Metis at MLconf SF 2016Brian Lucena, Senior Data Scientist, Metis at MLconf SF 2016
Brian Lucena, Senior Data Scientist, Metis at MLconf SF 2016MLconf
Β 
Luna Dong, Principal Scientist, Amazon at MLconf Seattle 2017
Luna Dong, Principal Scientist, Amazon at MLconf Seattle 2017Luna Dong, Principal Scientist, Amazon at MLconf Seattle 2017
Luna Dong, Principal Scientist, Amazon at MLconf Seattle 2017MLconf
Β 
Scott Clark, CEO, SigOpt, at MLconf Seattle 2017
Scott Clark, CEO, SigOpt, at MLconf Seattle 2017Scott Clark, CEO, SigOpt, at MLconf Seattle 2017
Scott Clark, CEO, SigOpt, at MLconf Seattle 2017MLconf
Β 
Jean-François Puget, Distinguished Engineer, Machine Learning and Optimizatio...
Jean-François Puget, Distinguished Engineer, Machine Learning and Optimizatio...Jean-François Puget, Distinguished Engineer, Machine Learning and Optimizatio...
Jean-François Puget, Distinguished Engineer, Machine Learning and Optimizatio...MLconf
Β 
Yi Wang, Tech Lead of AI Platform, Baidu, at MLconf 2017
Yi Wang, Tech Lead of AI Platform, Baidu, at MLconf 2017Yi Wang, Tech Lead of AI Platform, Baidu, at MLconf 2017
Yi Wang, Tech Lead of AI Platform, Baidu, at MLconf 2017MLconf
Β 
Josh Patterson, Advisor, Skymind – Deep learning for Industry at MLconf ATL 2016
Josh Patterson, Advisor, Skymind – Deep learning for Industry at MLconf ATL 2016Josh Patterson, Advisor, Skymind – Deep learning for Industry at MLconf ATL 2016
Josh Patterson, Advisor, Skymind – Deep learning for Industry at MLconf ATL 2016MLconf
Β 
Scott Clark, CEO, SigOpt, at The AI Conference 2017
Scott Clark, CEO, SigOpt, at The AI Conference 2017Scott Clark, CEO, SigOpt, at The AI Conference 2017
Scott Clark, CEO, SigOpt, at The AI Conference 2017MLconf
Β 
Nikhil Garg, Engineering Manager, Quora at MLconf SF 2016
Nikhil Garg, Engineering Manager, Quora at MLconf SF 2016Nikhil Garg, Engineering Manager, Quora at MLconf SF 2016
Nikhil Garg, Engineering Manager, Quora at MLconf SF 2016MLconf
Β 
Andrew Musselman, Committer and PMC Member, Apache Mahout, at MLconf Seattle ...
Andrew Musselman, Committer and PMC Member, Apache Mahout, at MLconf Seattle ...Andrew Musselman, Committer and PMC Member, Apache Mahout, at MLconf Seattle ...
Andrew Musselman, Committer and PMC Member, Apache Mahout, at MLconf Seattle ...MLconf
Β 
Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016
Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016
Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016MLconf
Β 
Sanjeev Satheesj, Research Scientist, Baidu at The AI Conference 2017
Sanjeev Satheesj, Research Scientist, Baidu at The AI Conference 2017Sanjeev Satheesj, Research Scientist, Baidu at The AI Conference 2017
Sanjeev Satheesj, Research Scientist, Baidu at The AI Conference 2017MLconf
Β 
Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016
Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016
Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016MLconf
Β 
Alexandra Johnson, Software Engineer, SigOpt, at MLconf NYC 2017
Alexandra Johnson, Software Engineer, SigOpt, at MLconf NYC 2017Alexandra Johnson, Software Engineer, SigOpt, at MLconf NYC 2017
Alexandra Johnson, Software Engineer, SigOpt, at MLconf NYC 2017MLconf
Β 

Viewers also liked (20)

Ben Lau, Quantitative Researcher, Hobbyist, at MLconf NYC 2017
Ben Lau, Quantitative Researcher, Hobbyist, at MLconf NYC 2017Ben Lau, Quantitative Researcher, Hobbyist, at MLconf NYC 2017
Ben Lau, Quantitative Researcher, Hobbyist, at MLconf NYC 2017
Β 
Stephanie deWet, Software Engineer, Pinterest at MLconf SF 2016
Stephanie deWet, Software Engineer, Pinterest at MLconf SF 2016Stephanie deWet, Software Engineer, Pinterest at MLconf SF 2016
Stephanie deWet, Software Engineer, Pinterest at MLconf SF 2016
Β 
Jeff Bradshaw, Founder, Adaptris
Jeff Bradshaw, Founder, AdaptrisJeff Bradshaw, Founder, Adaptris
Jeff Bradshaw, Founder, Adaptris
Β 
Chris Fregly, Research Scientist, PipelineIO at MLconf ATL 2016
Chris Fregly, Research Scientist, PipelineIO at MLconf ATL 2016Chris Fregly, Research Scientist, PipelineIO at MLconf ATL 2016
Chris Fregly, Research Scientist, PipelineIO at MLconf ATL 2016
Β 
Caroline Sinders, Online Harassment Researcher, Wikimedia at The AI Conferenc...
Caroline Sinders, Online Harassment Researcher, Wikimedia at The AI Conferenc...Caroline Sinders, Online Harassment Researcher, Wikimedia at The AI Conferenc...
Caroline Sinders, Online Harassment Researcher, Wikimedia at The AI Conferenc...
Β 
Virginia Smith, Researcher, UC Berkeley at MLconf SF 2016
Virginia Smith, Researcher, UC Berkeley at MLconf SF 2016Virginia Smith, Researcher, UC Berkeley at MLconf SF 2016
Virginia Smith, Researcher, UC Berkeley at MLconf SF 2016
Β 
Alex Smola, Director of Machine Learning, AWS/Amazon, at MLconf SF 2016
Alex Smola, Director of Machine Learning, AWS/Amazon, at MLconf SF 2016Alex Smola, Director of Machine Learning, AWS/Amazon, at MLconf SF 2016
Alex Smola, Director of Machine Learning, AWS/Amazon, at MLconf SF 2016
Β 
Brian Lucena, Senior Data Scientist, Metis at MLconf SF 2016
Brian Lucena, Senior Data Scientist, Metis at MLconf SF 2016Brian Lucena, Senior Data Scientist, Metis at MLconf SF 2016
Brian Lucena, Senior Data Scientist, Metis at MLconf SF 2016
Β 
Luna Dong, Principal Scientist, Amazon at MLconf Seattle 2017
Luna Dong, Principal Scientist, Amazon at MLconf Seattle 2017Luna Dong, Principal Scientist, Amazon at MLconf Seattle 2017
Luna Dong, Principal Scientist, Amazon at MLconf Seattle 2017
Β 
Scott Clark, CEO, SigOpt, at MLconf Seattle 2017
Scott Clark, CEO, SigOpt, at MLconf Seattle 2017Scott Clark, CEO, SigOpt, at MLconf Seattle 2017
Scott Clark, CEO, SigOpt, at MLconf Seattle 2017
Β 
Jean-François Puget, Distinguished Engineer, Machine Learning and Optimizatio...
Jean-François Puget, Distinguished Engineer, Machine Learning and Optimizatio...Jean-François Puget, Distinguished Engineer, Machine Learning and Optimizatio...
Jean-François Puget, Distinguished Engineer, Machine Learning and Optimizatio...
Β 
Yi Wang, Tech Lead of AI Platform, Baidu, at MLconf 2017
Yi Wang, Tech Lead of AI Platform, Baidu, at MLconf 2017Yi Wang, Tech Lead of AI Platform, Baidu, at MLconf 2017
Yi Wang, Tech Lead of AI Platform, Baidu, at MLconf 2017
Β 
Josh Patterson, Advisor, Skymind – Deep learning for Industry at MLconf ATL 2016
Josh Patterson, Advisor, Skymind – Deep learning for Industry at MLconf ATL 2016Josh Patterson, Advisor, Skymind – Deep learning for Industry at MLconf ATL 2016
Josh Patterson, Advisor, Skymind – Deep learning for Industry at MLconf ATL 2016
Β 
Scott Clark, CEO, SigOpt, at The AI Conference 2017
Scott Clark, CEO, SigOpt, at The AI Conference 2017Scott Clark, CEO, SigOpt, at The AI Conference 2017
Scott Clark, CEO, SigOpt, at The AI Conference 2017
Β 
Nikhil Garg, Engineering Manager, Quora at MLconf SF 2016
Nikhil Garg, Engineering Manager, Quora at MLconf SF 2016Nikhil Garg, Engineering Manager, Quora at MLconf SF 2016
Nikhil Garg, Engineering Manager, Quora at MLconf SF 2016
Β 
Andrew Musselman, Committer and PMC Member, Apache Mahout, at MLconf Seattle ...
Andrew Musselman, Committer and PMC Member, Apache Mahout, at MLconf Seattle ...Andrew Musselman, Committer and PMC Member, Apache Mahout, at MLconf Seattle ...
Andrew Musselman, Committer and PMC Member, Apache Mahout, at MLconf Seattle ...
Β 
Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016
Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016
Scott Clark, Co-Founder and CEO, SigOpt at MLconf SF 2016
Β 
Sanjeev Satheesj, Research Scientist, Baidu at The AI Conference 2017
Sanjeev Satheesj, Research Scientist, Baidu at The AI Conference 2017Sanjeev Satheesj, Research Scientist, Baidu at The AI Conference 2017
Sanjeev Satheesj, Research Scientist, Baidu at The AI Conference 2017
Β 
Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016
Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016
Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016
Β 
Alexandra Johnson, Software Engineer, SigOpt, at MLconf NYC 2017
Alexandra Johnson, Software Engineer, SigOpt, at MLconf NYC 2017Alexandra Johnson, Software Engineer, SigOpt, at MLconf NYC 2017
Alexandra Johnson, Software Engineer, SigOpt, at MLconf NYC 2017
Β 

Similar to Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017

know Machine Learning Basic Concepts.pdf
know Machine Learning Basic Concepts.pdfknow Machine Learning Basic Concepts.pdf
know Machine Learning Basic Concepts.pdfhemangppatel
Β 
Machine Learning ebook.pdf
Machine Learning ebook.pdfMachine Learning ebook.pdf
Machine Learning ebook.pdfHODIT12
Β 
1_5_AI_edx_ml_51intro_240204_104838machine learning lecture 1
1_5_AI_edx_ml_51intro_240204_104838machine learning lecture 11_5_AI_edx_ml_51intro_240204_104838machine learning lecture 1
1_5_AI_edx_ml_51intro_240204_104838machine learning lecture 1MostafaHazemMostafaa
Β 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningAI Summary
Β 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273Abutest
Β 
06-01 Machine Learning and Linear Regression.pptx
06-01 Machine Learning and Linear Regression.pptx06-01 Machine Learning and Linear Regression.pptx
06-01 Machine Learning and Linear Regression.pptxSaharA84
Β 
Introduction to conventional machine learning techniques
Introduction to conventional machine learning techniquesIntroduction to conventional machine learning techniques
Introduction to conventional machine learning techniquesXavier Rafael Palou
Β 
Machine learning cyphort_malware_most_wanted
Machine learning cyphort_malware_most_wantedMachine learning cyphort_malware_most_wanted
Machine learning cyphort_malware_most_wantedCyphort
Β 
Machine Learning Notes for beginners ,Step by step
Machine Learning Notes for beginners ,Step by stepMachine Learning Notes for beginners ,Step by step
Machine Learning Notes for beginners ,Step by stepSanjanaSaxena17
Β 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessingJason Rodrigues
Β 
Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...
Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...
Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...Jonathan Stray
Β 
CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLU...
CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLU...CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLU...
CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLU...IJCNCJournal
Β 
Artificial Neural Network
Artificial Neural NetworkArtificial Neural Network
Artificial Neural NetworkDessy Amirudin
Β 
coppin chapter 10e.ppt
coppin chapter 10e.pptcoppin chapter 10e.ppt
coppin chapter 10e.pptbutest
Β 
tutorial.ppt
tutorial.ppttutorial.ppt
tutorial.pptVara Prasad
Β 
Game theory for neural networks
Game theory for neural networksGame theory for neural networks
Game theory for neural networksDavid Balduzzi
Β 

Similar to Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017 (20)

know Machine Learning Basic Concepts.pdf
know Machine Learning Basic Concepts.pdfknow Machine Learning Basic Concepts.pdf
know Machine Learning Basic Concepts.pdf
Β 
Machine Learning ebook.pdf
Machine Learning ebook.pdfMachine Learning ebook.pdf
Machine Learning ebook.pdf
Β 
1_5_AI_edx_ml_51intro_240204_104838machine learning lecture 1
1_5_AI_edx_ml_51intro_240204_104838machine learning lecture 11_5_AI_edx_ml_51intro_240204_104838machine learning lecture 1
1_5_AI_edx_ml_51intro_240204_104838machine learning lecture 1
Β 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
Β 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273A
Β 
06-01 Machine Learning and Linear Regression.pptx
06-01 Machine Learning and Linear Regression.pptx06-01 Machine Learning and Linear Regression.pptx
06-01 Machine Learning and Linear Regression.pptx
Β 
Introduction to conventional machine learning techniques
Introduction to conventional machine learning techniquesIntroduction to conventional machine learning techniques
Introduction to conventional machine learning techniques
Β 
Machine learning cyphort_malware_most_wanted
Machine learning cyphort_malware_most_wantedMachine learning cyphort_malware_most_wanted
Machine learning cyphort_malware_most_wanted
Β 
1 public embedd
1 public embedd1 public embedd
1 public embedd
Β 
related
relatedrelated
related
Β 
main
mainmain
main
Β 
Machine Learning Notes for beginners ,Step by step
Machine Learning Notes for beginners ,Step by stepMachine Learning Notes for beginners ,Step by step
Machine Learning Notes for beginners ,Step by step
Β 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
Β 
Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...
Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...
Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...
Β 
CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLU...
CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLU...CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLU...
CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLU...
Β 
Ml ppt at
Ml ppt atMl ppt at
Ml ppt at
Β 
Artificial Neural Network
Artificial Neural NetworkArtificial Neural Network
Artificial Neural Network
Β 
coppin chapter 10e.ppt
coppin chapter 10e.pptcoppin chapter 10e.ppt
coppin chapter 10e.ppt
Β 
tutorial.ppt
tutorial.ppttutorial.ppt
tutorial.ppt
Β 
Game theory for neural networks
Game theory for neural networksGame theory for neural networks
Game theory for neural networks
Β 

More from MLconf

Jamila Smith-Loud - Understanding Human Impact: Social and Equity Assessments...
Jamila Smith-Loud - Understanding Human Impact: Social and Equity Assessments...Jamila Smith-Loud - Understanding Human Impact: Social and Equity Assessments...
Jamila Smith-Loud - Understanding Human Impact: Social and Equity Assessments...MLconf
Β 
Ted Willke - The Brain’s Guide to Dealing with Context in Language Understanding
Ted Willke - The Brain’s Guide to Dealing with Context in Language UnderstandingTed Willke - The Brain’s Guide to Dealing with Context in Language Understanding
Ted Willke - The Brain’s Guide to Dealing with Context in Language UnderstandingMLconf
Β 
Justin Armstrong - Applying Computer Vision to Reduce Contamination in the Re...
Justin Armstrong - Applying Computer Vision to Reduce Contamination in the Re...Justin Armstrong - Applying Computer Vision to Reduce Contamination in the Re...
Justin Armstrong - Applying Computer Vision to Reduce Contamination in the Re...MLconf
Β 
Igor Markov - Quantum Computing: a Treasure Hunt, not a Gold Rush
Igor Markov - Quantum Computing: a Treasure Hunt, not a Gold RushIgor Markov - Quantum Computing: a Treasure Hunt, not a Gold Rush
Igor Markov - Quantum Computing: a Treasure Hunt, not a Gold RushMLconf
Β 
Josh Wills - Data Labeling as Religious Experience
Josh Wills - Data Labeling as Religious ExperienceJosh Wills - Data Labeling as Religious Experience
Josh Wills - Data Labeling as Religious ExperienceMLconf
Β 
Vinay Prabhu - Project GaitNet: Ushering in the ImageNet moment for human Gai...
Vinay Prabhu - Project GaitNet: Ushering in the ImageNet moment for human Gai...Vinay Prabhu - Project GaitNet: Ushering in the ImageNet moment for human Gai...
Vinay Prabhu - Project GaitNet: Ushering in the ImageNet moment for human Gai...MLconf
Β 
Jekaterina Novikova - Machine Learning Methods in Detecting Alzheimer’s Disea...
Jekaterina Novikova - Machine Learning Methods in Detecting Alzheimer’s Disea...Jekaterina Novikova - Machine Learning Methods in Detecting Alzheimer’s Disea...
Jekaterina Novikova - Machine Learning Methods in Detecting Alzheimer’s Disea...MLconf
Β 
Meghana Ravikumar - Optimized Image Classification on the Cheap
Meghana Ravikumar - Optimized Image Classification on the CheapMeghana Ravikumar - Optimized Image Classification on the Cheap
Meghana Ravikumar - Optimized Image Classification on the CheapMLconf
Β 
Noam Finkelstein - The Importance of Modeling Data Collection
Noam Finkelstein - The Importance of Modeling Data CollectionNoam Finkelstein - The Importance of Modeling Data Collection
Noam Finkelstein - The Importance of Modeling Data CollectionMLconf
Β 
June Andrews - The Uncanny Valley of ML
June Andrews - The Uncanny Valley of MLJune Andrews - The Uncanny Valley of ML
June Andrews - The Uncanny Valley of MLMLconf
Β 
Sneha Rajana - Deep Learning Architectures for Semantic Relation Detection Tasks
Sneha Rajana - Deep Learning Architectures for Semantic Relation Detection TasksSneha Rajana - Deep Learning Architectures for Semantic Relation Detection Tasks
Sneha Rajana - Deep Learning Architectures for Semantic Relation Detection TasksMLconf
Β 
Anoop Deoras - Building an Incrementally Trained, Local Taste Aware, Global D...
Anoop Deoras - Building an Incrementally Trained, Local Taste Aware, Global D...Anoop Deoras - Building an Incrementally Trained, Local Taste Aware, Global D...
Anoop Deoras - Building an Incrementally Trained, Local Taste Aware, Global D...MLconf
Β 
Vito Ostuni - The Voice: New Challenges in a Zero UI World
Vito Ostuni - The Voice: New Challenges in a Zero UI WorldVito Ostuni - The Voice: New Challenges in a Zero UI World
Vito Ostuni - The Voice: New Challenges in a Zero UI WorldMLconf
Β 
Anna choromanska - Data-driven Challenges in AI: Scale, Information Selection...
Anna choromanska - Data-driven Challenges in AI: Scale, Information Selection...Anna choromanska - Data-driven Challenges in AI: Scale, Information Selection...
Anna choromanska - Data-driven Challenges in AI: Scale, Information Selection...MLconf
Β 
Janani Kalyanam - Machine Learning to Detect Illegal Online Sales of Prescrip...
Janani Kalyanam - Machine Learning to Detect Illegal Online Sales of Prescrip...Janani Kalyanam - Machine Learning to Detect Illegal Online Sales of Prescrip...
Janani Kalyanam - Machine Learning to Detect Illegal Online Sales of Prescrip...MLconf
Β 
Esperanza Lopez Aguilera - Using a Bayesian Neural Network in the Detection o...
Esperanza Lopez Aguilera - Using a Bayesian Neural Network in the Detection o...Esperanza Lopez Aguilera - Using a Bayesian Neural Network in the Detection o...
Esperanza Lopez Aguilera - Using a Bayesian Neural Network in the Detection o...MLconf
Β 
Neel Sundaresan - Teaching a machine to code
Neel Sundaresan - Teaching a machine to codeNeel Sundaresan - Teaching a machine to code
Neel Sundaresan - Teaching a machine to codeMLconf
Β 
Rishabh Mehrotra - Recommendations in a Marketplace: Personalizing Explainabl...
Rishabh Mehrotra - Recommendations in a Marketplace: Personalizing Explainabl...Rishabh Mehrotra - Recommendations in a Marketplace: Personalizing Explainabl...
Rishabh Mehrotra - Recommendations in a Marketplace: Personalizing Explainabl...MLconf
Β 
Soumith Chintala - Increasing the Impact of AI Through Better Software
Soumith Chintala - Increasing the Impact of AI Through Better SoftwareSoumith Chintala - Increasing the Impact of AI Through Better Software
Soumith Chintala - Increasing the Impact of AI Through Better SoftwareMLconf
Β 
Roy Lowrance - Predicting Bond Prices: Regime Changes
Roy Lowrance - Predicting Bond Prices: Regime ChangesRoy Lowrance - Predicting Bond Prices: Regime Changes
Roy Lowrance - Predicting Bond Prices: Regime ChangesMLconf
Β 

More from MLconf (20)

Jamila Smith-Loud - Understanding Human Impact: Social and Equity Assessments...
Jamila Smith-Loud - Understanding Human Impact: Social and Equity Assessments...Jamila Smith-Loud - Understanding Human Impact: Social and Equity Assessments...
Jamila Smith-Loud - Understanding Human Impact: Social and Equity Assessments...
Β 
Ted Willke - The Brain’s Guide to Dealing with Context in Language Understanding
Ted Willke - The Brain’s Guide to Dealing with Context in Language UnderstandingTed Willke - The Brain’s Guide to Dealing with Context in Language Understanding
Ted Willke - The Brain’s Guide to Dealing with Context in Language Understanding
Β 
Justin Armstrong - Applying Computer Vision to Reduce Contamination in the Re...
Justin Armstrong - Applying Computer Vision to Reduce Contamination in the Re...Justin Armstrong - Applying Computer Vision to Reduce Contamination in the Re...
Justin Armstrong - Applying Computer Vision to Reduce Contamination in the Re...
Β 
Igor Markov - Quantum Computing: a Treasure Hunt, not a Gold Rush
Igor Markov - Quantum Computing: a Treasure Hunt, not a Gold RushIgor Markov - Quantum Computing: a Treasure Hunt, not a Gold Rush
Igor Markov - Quantum Computing: a Treasure Hunt, not a Gold Rush
Β 
Josh Wills - Data Labeling as Religious Experience
Josh Wills - Data Labeling as Religious ExperienceJosh Wills - Data Labeling as Religious Experience
Josh Wills - Data Labeling as Religious Experience
Β 
Vinay Prabhu - Project GaitNet: Ushering in the ImageNet moment for human Gai...
Vinay Prabhu - Project GaitNet: Ushering in the ImageNet moment for human Gai...Vinay Prabhu - Project GaitNet: Ushering in the ImageNet moment for human Gai...
Vinay Prabhu - Project GaitNet: Ushering in the ImageNet moment for human Gai...
Β 
Jekaterina Novikova - Machine Learning Methods in Detecting Alzheimer’s Disea...
Jekaterina Novikova - Machine Learning Methods in Detecting Alzheimer’s Disea...Jekaterina Novikova - Machine Learning Methods in Detecting Alzheimer’s Disea...
Jekaterina Novikova - Machine Learning Methods in Detecting Alzheimer’s Disea...
Β 
Meghana Ravikumar - Optimized Image Classification on the Cheap
Meghana Ravikumar - Optimized Image Classification on the CheapMeghana Ravikumar - Optimized Image Classification on the Cheap
Meghana Ravikumar - Optimized Image Classification on the Cheap
Β 
Noam Finkelstein - The Importance of Modeling Data Collection
Noam Finkelstein - The Importance of Modeling Data CollectionNoam Finkelstein - The Importance of Modeling Data Collection
Noam Finkelstein - The Importance of Modeling Data Collection
Β 
June Andrews - The Uncanny Valley of ML
June Andrews - The Uncanny Valley of MLJune Andrews - The Uncanny Valley of ML
June Andrews - The Uncanny Valley of ML
Β 
Sneha Rajana - Deep Learning Architectures for Semantic Relation Detection Tasks
Sneha Rajana - Deep Learning Architectures for Semantic Relation Detection TasksSneha Rajana - Deep Learning Architectures for Semantic Relation Detection Tasks
Sneha Rajana - Deep Learning Architectures for Semantic Relation Detection Tasks
Β 
Anoop Deoras - Building an Incrementally Trained, Local Taste Aware, Global D...
Anoop Deoras - Building an Incrementally Trained, Local Taste Aware, Global D...Anoop Deoras - Building an Incrementally Trained, Local Taste Aware, Global D...
Anoop Deoras - Building an Incrementally Trained, Local Taste Aware, Global D...
Β 
Vito Ostuni - The Voice: New Challenges in a Zero UI World
Vito Ostuni - The Voice: New Challenges in a Zero UI WorldVito Ostuni - The Voice: New Challenges in a Zero UI World
Vito Ostuni - The Voice: New Challenges in a Zero UI World
Β 
Anna choromanska - Data-driven Challenges in AI: Scale, Information Selection...
Anna choromanska - Data-driven Challenges in AI: Scale, Information Selection...Anna choromanska - Data-driven Challenges in AI: Scale, Information Selection...
Anna choromanska - Data-driven Challenges in AI: Scale, Information Selection...
Β 
Janani Kalyanam - Machine Learning to Detect Illegal Online Sales of Prescrip...
Janani Kalyanam - Machine Learning to Detect Illegal Online Sales of Prescrip...Janani Kalyanam - Machine Learning to Detect Illegal Online Sales of Prescrip...
Janani Kalyanam - Machine Learning to Detect Illegal Online Sales of Prescrip...
Β 
Esperanza Lopez Aguilera - Using a Bayesian Neural Network in the Detection o...
Esperanza Lopez Aguilera - Using a Bayesian Neural Network in the Detection o...Esperanza Lopez Aguilera - Using a Bayesian Neural Network in the Detection o...
Esperanza Lopez Aguilera - Using a Bayesian Neural Network in the Detection o...
Β 
Neel Sundaresan - Teaching a machine to code
Neel Sundaresan - Teaching a machine to codeNeel Sundaresan - Teaching a machine to code
Neel Sundaresan - Teaching a machine to code
Β 
Rishabh Mehrotra - Recommendations in a Marketplace: Personalizing Explainabl...
Rishabh Mehrotra - Recommendations in a Marketplace: Personalizing Explainabl...Rishabh Mehrotra - Recommendations in a Marketplace: Personalizing Explainabl...
Rishabh Mehrotra - Recommendations in a Marketplace: Personalizing Explainabl...
Β 
Soumith Chintala - Increasing the Impact of AI Through Better Software
Soumith Chintala - Increasing the Impact of AI Through Better SoftwareSoumith Chintala - Increasing the Impact of AI Through Better Software
Soumith Chintala - Increasing the Impact of AI Through Better Software
Β 
Roy Lowrance - Predicting Bond Prices: Regime Changes
Roy Lowrance - Predicting Bond Prices: Regime ChangesRoy Lowrance - Predicting Bond Prices: Regime Changes
Roy Lowrance - Predicting Bond Prices: Regime Changes
Β 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
Β 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
Β 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
Β 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Β 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
Β 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
Β 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
Β 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
Β 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
Β 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
Β 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
Β 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
Β 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
Β 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
Β 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
Β 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
Β 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
Β 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
Β 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
Β 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
Β 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Β 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Β 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Β 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Β 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Β 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Β 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Β 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Β 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Β 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
Β 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Β 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Β 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Β 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Β 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
Β 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Β 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Β 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Β 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Β 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Β 

Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017

  • 1. Differential Privacy And Machine Learning Aaron Roth March 24, 2017
  • 2. Protecting Privacy is Important Class action lawsuit accuses AOL of violating the Electronic Communications Privacy Act, seeks $5,000 in damages per user. AOL’s director of research is fired.
  • 3. Protecting Privacy is Important Class action lawsuit (Doe v. Netflix) accuses Netflix of violating the Video Privacy Protection Act, seeks $2,000 in compensation for each of Netflix’s 2,000,000 subscribers. Settled for undisclosed sum, 2nd Netflix Challenge is cancelled.
  • 4. Protecting Privacy is Important The National Human Genome Research Institute (NHGRI) immediately restricted pooled genomic data that had previously been publically available.
  • 5. So What is Differential Privacy?
  • 6. So What is Differential Privacy? β€’ Differential Privacy is about promising people freedom from harm. β€œAn analysis of a dataset D is differentially private if the data analyst knows almost no more about Alice after the analysis than he would have known had he conducted the same analysis on an identical data set with Alice’s data removed.”
  • 7. D Differential Privacy [Dwork-McSherry-Nissim-Smith 06] Algorithm Pr [r] ratio bounded Alice Bob Chris Donna ErnieXavier
  • 8. Differential Privacy 𝑋: The data universe. 𝐷 βŠ‚ 𝑋: The dataset (one element per person) Definition: Two datasets 𝐷, 𝐷′ βŠ‚ 𝑋 are neighbors if they differ in the data of a single individual.
  • 9. Differential Privacy 𝑋: The data universe. 𝐷 βŠ‚ 𝑋: The dataset (one element per person) Definition: An algorithm 𝑀 is πœ–-differentially private if for all pairs of neighboring datasets 𝐷, 𝐷′ , and for all outputs x: Pr 𝑀 𝐷 = π‘₯ ≀ (1 + πœ–) Pr 𝑀 𝐷′ = π‘₯
  • 10. Some Useful Properties Theorem (Postprocessing): If 𝑀(𝐷) is πœ–-private, and 𝑓 is any (randomized) function, then 𝑓(𝑀 𝐷 ) is πœ–-private.
  • 11. So… π‘₯ = Definition: An algorithm 𝑀 is πœ–-differentially private if for all pairs of neighboring datasets 𝐷, 𝐷′ , and for all outputs x: Pr 𝑀 𝐷 = π‘₯ ≀ (1 + πœ–) Pr 𝑀 𝐷′ = π‘₯
  • 12. So… π‘₯ = Definition: An algorithm 𝑀 is πœ–-differentially private if for all pairs of neighboring datasets 𝐷, 𝐷′ , and for all outputs x: Pr 𝑀 𝐷 = π‘₯ ≀ (1 + πœ–) Pr 𝑀 𝐷′ = π‘₯
  • 13. So… π‘₯ = Definition: An algorithm 𝑀 is πœ–-differentially private if for all pairs of neighboring datasets 𝐷, 𝐷′ , and for all outputs x: Pr 𝑀 𝐷 = π‘₯ ≀ (1 + πœ–) Pr 𝑀 𝐷′ = π‘₯
  • 14. Some Useful Properties Theorem (Composition): If 𝑀1, … , 𝑀 π‘˜ are πœ–-private, then: 𝑀 𝐷 ≑ (𝑀1 𝐷 , … , 𝑀 π‘˜ 𝐷 ) is π‘˜πœ–-private.
  • 15. So… You can go about designing algorithms as you normally would. Just access the data using differentially private β€œsubroutines”, and keep track of your β€œprivacy budget” as a resource. Private algorithm design, like regular algorithm design, can be modular.
  • 16. Some simple operations: Answering Numeric Queries Def: A numeric function 𝑓 has sensitivity 𝑐 if for all neighboring 𝐷, 𝐷′ : 𝑓 𝐷 βˆ’ 𝑓 𝐷′ ≀ 𝑐 Write 𝑠 𝑓 ≑ 𝑐 β€’ e.g. β€œHow many software engineers are in the room?” has sensitivity 1. β€’ β€œWhat fraction of people in the room are software engineers?” has sensitivity 1 𝑛 .
  • 17. Some simple operations: Answering Numeric Queries The Laplace Mechanism: π‘€πΏπ‘Žπ‘ 𝐷, 𝑓, πœ– = 𝑓 𝐷 + πΏπ‘Žπ‘ 𝑠 𝑓 πœ– Theorem: π‘€πΏπ‘Žπ‘(β‹…, 𝑓, πœ–) is πœ–-private.
  • 18. Some simple operations: Answering Numeric Queries The Laplace Mechanism: π‘€πΏπ‘Žπ‘ 𝐷, 𝑓, πœ– = 𝑓 𝐷 + πΏπ‘Žπ‘ 𝑠 𝑓 πœ– Theorem: The expected error is 𝑠 𝑓 πœ– (can answer β€œwhat fraction of people in the room are software engineers?” with error 0.2%)
  • 19. Some simple operations: Answering Non-numeric Queries β€œWhat is the modal eye color in the room?” 𝑅 = {Blue, Green, Brown, Red} β€’ If you can define a function that determines how β€œgood” each outcome is for a fixed input: – E.g. π‘ž 𝐷, Red =β€œfraction of people in D with red eyes”
  • 20. Some simple operations: Answering Non-numeric Queries 𝑀 𝐸π‘₯𝑝(𝐷, 𝑅, π‘ž, πœ–): Output π‘Ÿ ∈ 𝑅 w.p. ∝ 𝑒2πœ–β‹…π‘ž 𝐷,π‘Ÿ Theorem: 𝑀 𝐸π‘₯𝑝(𝐷, 𝑅, π‘ž, πœ–) is 𝑠 π‘ž β‹… πœ–-private, and outputs π‘Ÿ ∈ 𝑅 such that: 𝐸 π‘ž 𝐷, π‘Ÿ βˆ’ max π‘Ÿβˆ—βˆˆπ‘… π‘ž 𝐷, π‘Ÿβˆ— ≀ 2𝑠 π‘ž πœ– β‹… ln 𝑅 (can find a color that has frequency within 0.5% of the modal color in the room)
  • 21. So what can we do with that? Empirical Risk Minimization: *i.e. almost all of supervised learning Find πœƒ to minimize: 𝐿 πœƒ = 𝑖=1 𝑛 β„“ πœƒ, π‘₯𝑖, 𝑦𝑖
  • 22. So what can we do with that? Empirical Risk Minimization: Simple Special Case: Linear Regression Find πœƒ ∈ 𝑅 𝑑 to minimize: 𝑖=1 𝑛 πœƒ, π‘₯𝑖 βˆ’ 𝑦𝑖 2
  • 23. So what can we do with that? β€’ First Attempt: Try the exponential mechanism! β€’ Define π‘ž πœƒ, 𝐷 = βˆ’ π‘‹πœƒ βˆ’ 𝑦 𝑇 (π‘‹πœƒ βˆ’ 𝑦) β€’ Output πœƒ ∈ ℝ 𝑑 w.p. ∝ 𝑒2πœ–π‘ž(πœƒ,𝐷) – How? β€’ In this case, reduces to: Output πœƒβˆ— + 𝑁 0, 𝑋 𝑇 𝑋 βˆ’1 2πœ– Where πœƒβˆ— = arg min 𝑖=1 𝑛 πœƒ, π‘₯𝑖 βˆ’ 𝑦𝑖 2
  • 24. So what can we do with that? Empirical Risk Minimization: The General Case (e.g. deep learning) Find πœƒ to minimize: 𝐿 πœƒ = 𝑖=1 𝑛 β„“ πœƒ, π‘₯𝑖, 𝑦𝑖
  • 25. Stochastic Gradient Descent Convergence depends on the fact that at each round: 𝔼 𝑔𝑑 = 𝛻L(πœƒ) Let πœƒ1 = 0 𝑑 For 𝑑 = 1 to 𝑇: Pick 𝑖 at random. Let 𝑔𝑑 ← 𝛻ℓ πœƒ 𝑑, π‘₯𝑖, 𝑦𝑖 Let πœƒ 𝑑+1 ← πœƒ 𝑑 βˆ’ πœ‚ β‹… 𝑔𝑑
  • 26. Private Stochastic Gradient Descent Still have: 𝔼 𝑔𝑑 = 𝛻L πœƒ ! (Can still prove convergence theorems, and run the algorithm…) Privacy guarantees can be computed from: 1) The privacy of the Laplace mechanism 2) Preservation of privacy under post-processing, and 3) Composition of privacy guarantees. Let πœƒ1 = 0 𝑑 For 𝑑 = 1 to 𝑇: Pick 𝑖 at random. Let 𝑔𝑑 ← 𝛻ℓ πœƒ 𝑑, π‘₯𝑖, 𝑦𝑖 + πΏπ‘Žπ‘ 𝜎 𝑑 Let πœƒ 𝑑+1 ← πœƒ 𝑑 βˆ’ πœ‚ β‹… 𝑔𝑑
  • 27. What else can we do? β€’ Statistical Estimation β€’ Graph Analysis β€’ Combinatorial Optimization β€’ Spectral Analysis of Matrices β€’ Anomaly Detection/Analysis of Data Streams β€’ Convex Optimization β€’ Equilibrium computation β€’ Computation of optimal 1-sided and 2-sided matchings β€’ Pareto Optimal Exchanges β€’ …
  • 28. Differential Privacy β‡’ Learning Theorem*: An πœ–-differentially private algorithm cannot overfit its training set by more than πœ–. *Lots of interesting details missing! See our paper in Science.
  • 29. from numpy import * def Thresholdout(sample, holdout, q, sigma, threshold): sample_mean = mean([q(x) for x in sample]) holdout_mean = mean([q(x) for x in holdout]) if (abs(sample_mean - holdout_mean) < random.normal(threshold, sigma)): # q does not overfit return sample_mean else: # q overfits return holdout_mean + random.normal(0, sigma) thresholdout.py: Thresholdout [DFHPRR15]
  • 30. Reusable holdout example β€’ Data set with 2n = 20,000 rows and d = 10,000 variables. Class labels in {-1,1} β€’ Analyst performs stepwise variable selection: 1. Split data into training/holdout of size n 2. Select β€œbest” k variables on training data 3. Only use variables also good on holdout 4. Build linear predictor out of k variables 5. Find best k = 10,20,30,…
  • 31. Classification after feature selection No signal: data are random gaussians labels are drawn independently at random from {-1,1} Thresholdout correctly detects overfitting!
  • 32. Strong signal: 20 features are mildly correlated with target remaining attributes are uncorrelated Thresholdout correctly detects right model size! Classification after feature selection
  • 33. So… β€’ Differential privacy provides: – A rigorous, provable guarantee with a strong privacy semantics. – A set of tools and composition theorems that allow for modular, easy design of privacy preserving algorithms. – Protection against overfitting even when privacy is not a concern.
  • 34. Thanks! To learn more: β€’ Our textbook on differential privacy: – Available for free on my website: http://www.cis.upenn.edu/~aaroth β€’ Connections between Privacy and Overfitting: – Dwork, Feldman, Hardt, Pitassi, Reingold, Roth, β€œThe Reusable Holdout: Preserving Validity in Adaptive Data Analysis”, Science, August 7 2015. – Dwork, Feldman, Hardt, Pitassi, Reingold, Roth, β€œPreserving Statistical Validity in Adaptive Data Analysis”, STOC 2015. – Bassily, Nissim, Stemmer, Smith, Steinke, Ullman, β€œAlgorithmic Stability for Adaptive Data Analysis”, STOC 2016. – Rogers, Roth, Smith, Thakkar, β€œMax Information, Differential Privacy, and Post-Selection Hypothesis Testing”, FOCS 2016. – Cummings, Ligett, Nissim, Roth, Wu, β€œAdaptive Learning with Robust Generalization Guarantees”, COLT 2016.