Efficient Lipschitz Extensions for High-Dimensional Graph Statistics and Node Private Degree Distributions
نویسندگان
چکیده
Lipschitz extensions were recently proposed as a tool for designing node differentially private algorithms. However, efficiently computable Lipschitz extensions were known only for 1-dimensional functions (that is, functions that output a single real value). In this paper, we study efficiently computable Lipschitz extensions for multi-dimensional (that is, vector-valued) functions on graphs. We show that, unlike for 1-dimensional functions, Lipschitz extensions of higher-dimensional functions on graphs do not always exist, even with a non-unit stretch. We design Lipschitz extensions with small stretch for the sorted degree list and for the degree distribution of a graph. Crucially, our extensions are efficiently computable. We also develop new tools for employing Lipschitz extensions in the design of differentially private algorithms. Specifically, we generalize the exponential mechanism, a widely used tool in data privacy. The exponential mechanism is given a collection of score functions that map datasets to real values. It attempts to return the name of the function with nearly minimum value on the data set. Our generalized exponential mechanism provides better accuracy when the sensitivity of an optimal score function is much smaller than the maximum sensitivity of score functions. We use our Lipschitz extension and the generalized exponential mechanism to design a nodedifferentially private algorithm for releasing an approximation to the degree distribution of a graph. Our algorithm is much more accurate than algorithms from previous work. ∗Computer Science and Engineering Department, Pennsylvania State University. {asmith,sofya}@cse.psu.edu. Supported by NSF awards CDI-0941553 and IIS-1447700 and a Google Faculty Award. Part of this work was done while visiting Boston University’s Hariri Institute for Computation. 1 ar X iv :1 50 4. 07 91 2v 1 [ cs .C R ] 2 9 A pr 2 01 5
منابع مشابه
Analyzing Graphs with Node Differential Privacy
We develop algorithms for the private analysis of network data that provide accurate analysis of realistic networks while satisfying stronger privacy guarantees than those of previous work. We present several techniques for designing node differentially private algorithms, that is, algorithms whose output distribution does not change significantly when a node and all its adjacent edges are adde...
متن کاملOn Node-differentially Private Algorithms for Graph Statistics
In this report, we start by surveying three papers on node differential privacy. First, we look at how the three papers revolve around the same idea. At the same time, we also discuss the differences in their approach and implementation. Then, we discuss some recent work by the author, which is related to privately releasing the count of graph structures in a graph. We discuss the best possible...
متن کاملMaximum Entropy Distributions on Graphs by Andre Yohannes Wibisono
Maximum Entropy Distributions on Graphs by Andre Yohannes Wibisono Master of Arts in Statistics University of California, Berkeley Professor Michael I. Jordan, Chair We study the maximum entropy distribution on weighted graphs with a given expected degree sequence. This distribution on graphs is characterized by independent edge weights parameterized by vertex potentials at each node. Using the...
متن کاملThe Letac-Massam conjecture and existence of high dimensional Bayes estimators for Graphical Models
The Wishart distribution, defined on the open convex positive definite cone, plays a central role in multivariate analysis and multivariate distribution theory. Its domain of integrability is often referred to as the Gindikin set. In recent years, a variety of useful extensions of the Wishart have been proposed in the literature for the purposes of studying Markov random fields / graphical mode...
متن کاملInterval-Based Graph Representations for Efficient Web Querying
We investigate natural extensions of the Continuous Image Graph (CIG) labelling scheme, which is based on the Consecutive Ones Property of matrices. The CIG labelling scheme generalizes tree labelling schemes to many graphs yet remaining as efficient, i.e., adjacency tests run in constant time, the space requirement is constant per node, and testing whether a graph is a CIG is possible in polyn...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1504.07912 شماره
صفحات -
تاریخ انتشار 2015