Differential Privacy Part-III: Composition

Composition is one of the major features of DP. This allows us to not only quantify how privacy is guaranteed for a single query or mechanism but a series of of them

Basic Composition Simplest rule of them is basic composition , which states that if k DP algorithms are run the privacy is now


Composition takes into account two possible ways privacy could be degraded:

When the multiple queries are ran on the same database multiple times Queries are run on seperate databases containing information on same individuals. It is also possible for adversery to influence creation of databases to learn about given target. Advanced Composition The basic composition could handle only linear possible degradation in privacy which may not be the case in practice. Introducing Advanced composition which could handle more advanced forms of privacy degradation. When an adversery ideally plans to learn about the database they don’t typically do it linearly , they do in a fashion where they adapt better with increased number of queries. The adversery uses information from previous mechanisms and use information of current mechanism to learn in future mechanisms. Advanced composition given by

It is usually a pessimistic bound for understanding privacy degradation


Introduction to Weakly Supervised Learning

3 minute read

Supervised Machine Learning relies on labelled data that consists of data and pairs of expected outputs. For example an image of dog that is labelled a dog. ...

Meta Learning with MAML

3 minute read

Training neural networks for a single task requires several thousands of examples for a each class when training a model from scratch. This is typically not ...

Analyze Private datasets using Pandas

6 minute read

Conventionally pandas allows you to analyze datasets that are present locally on your PC, that is when you are given access to a given dataset. But, there a...

Back to top ↑


Deep Learning in Practice-Be The algorithm

6 minute read

Conventional machine learning required the practitioner to manually look at images/text and handcraft appropriate features. Deep Learning models are powerful...

Back to top ↑


Differential Privacy Part-II: DP Mechanisms

6 minute read

Having gone through the importance of differential privacy and its definition, this article motivates the theory with a practical example to make it more int...

Differential Privacy Part-I: Introduction

6 minute read

Personal data is a personal valuable asset, it could be used for economic, social or even malicious benifits. Most internet companies survive on personal dat...

Back to top ↑