IEEE Computational Intelligence Magazine - May 2020 - 50

are numerous. In some domains, espe-
cially medicine and finance, each insti-
tute only has access to limited amount
of data, and large datasets are often
crowdsourced. Even though these datas-
ets for machine learning tasks enable
faster commercial or scientific progress,
the critical and sensible demand for
preserving individual privacy from inva-
sion continues to rise in the crowd,
companies and the government.
Ideally, the sensitive individual infor-
mation should not be leaked in the pro-
cess of training machine learning mod-
els. In other words, we allow the
parameters of machine learning models
to learn general patterns (people who
smoke are more likely to suffer from
lung cancer), rather than facts about spe-
cific training samples (he had lung can-
cer). Unfortunately, shallow models like
support vector machine and logistic
regression are capable of memorizing
secret information of the training data-
set [2]. Deep models like convolutional
neural networks are able to exactly
memorize arbitrary labels of the training
data [3]. Recent attacks against machine
learning models as in [2], [4]-[8]
emphasize the implicit risks and catalyze
an urgent demand for privacy preserv-

M(D)
M(D ′)

Differential Privacy Mechanism

Instance

Inference

Ratio Bounded
by e P

ing. For examples, Shokri et al. [4]
designed a membership inference attack
that can estimate whether the training
dataset contains a specific data record via
the black-box access to the model.
Fredrikson et al. [5] presented a model
inversion attack that can reveal individ-
ual faces given the API of the face rec-
ognition system and the name of the
user to be identified. In [6], the decision
probability of the classification model
can be used for the model extraction
attack, which implicitly steals the sensi-
tive training data. Attackers abuse the
pharmacogenetic model to inversely
infer the patients' genetic markers [7].
Adversaries can maliciously acquire
unexpected but useful information from
the machine learning classifiers [8].
To alleviate the possible privacy threats
to data owners, an attractive and viable
method is to involve the privacy-preserv-
ing techniques into machine learning
approaches. In early works, it is prevalent
to anonymize the data before analyzing
data including k-anonymity [9], l-diversity
[10], t-closeness [11], which remove pri-
vate details or replace them with random
values. Nevertheless, they are not always
sufficient and only provide privacy guar-
antee to a certain extent, especially when

Dataset
Algorithms
Learning

Released Models
0 1 2 ...8 9
Prediction

FIGURE 1 A graphical illustration of incorporating differential privacy into machine learning for
privacy preserving.

50

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | MAY 2020

adversaries own auxiliary individual infor-
mation in the sensitive dataset. Besides,
anonymizing is not applicable to high-
dimensional or diverse input datasets due
to its strong theoretical and empirical lim-
itations [12], [13]. As a solid privacy
model, differential privacy [14] has
recently been considered as a promising
strategy for privacy preserving in machine
learning. There are roughly three major
reasons: (1) Differential privacy can pro-
vide a provable privacy guarantee for
individuals, which benefits from the most
solid theoretical basis compared with
other privacy-preserving models [9]-[11],
[15], [16]. (2) Differential privacy achieves
privacy preserving in machine learning by
adding a calibrated amount of noise to
the model or output results according to
the concrete mechanisms instead of sim-
ply anonymizing the individual data. (3)
Differential privacy can make a graceful
compromise between privacy and utility
by adjusting a privacy budget index, in
which the smaller the value of the privacy
budget, the stronger privacy guarantee it
provides. For data owners, differentially
private machine learning further ensures
that the adversaries are incapable to infer
any information about a single record
with high confidence from the released
machine learning models or output
results, even if an adversary knows all the
remaining records in this dataset. A graph-
ical illustration of incorporating differen-
tial privacy into machine learning for pri-
vacy preserving is shown in Figure 1.
In the past decade, we have witnessed
the rapid advances of new methods about
differentially private machine learning.
This is entirely due to the remarkable
capability of differential privacy in pro-
viding effective and efficient approaches
for solving the problem of privacy pre-
serving, by utilizing the basic mechanisms
such as Laplace mechanism [14], expo-
nential mechanism [17], and functional
perturbation mechanism [18]. These dif-
ferential privacy mechanisms can com-
bine the strength of differential privacy to
satisfy the requirement of privacy pre-
serving for non-private prototypes of a
wide range of machine learning tech-
niques. There are only a few existing
reviews on the topic of differentially



IEEE Computational Intelligence Magazine - May 2020

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - May 2020

IEEE Computational Intelligence Magazine - May 2020 - Cover1
IEEE Computational Intelligence Magazine - May 2020 - Cover2
IEEE Computational Intelligence Magazine - May 2020 - 1
IEEE Computational Intelligence Magazine - May 2020 - 2
IEEE Computational Intelligence Magazine - May 2020 - 3
IEEE Computational Intelligence Magazine - May 2020 - 4
IEEE Computational Intelligence Magazine - May 2020 - 5
IEEE Computational Intelligence Magazine - May 2020 - 6
IEEE Computational Intelligence Magazine - May 2020 - 7
IEEE Computational Intelligence Magazine - May 2020 - 8
IEEE Computational Intelligence Magazine - May 2020 - 9
IEEE Computational Intelligence Magazine - May 2020 - 10
IEEE Computational Intelligence Magazine - May 2020 - 11
IEEE Computational Intelligence Magazine - May 2020 - 12
IEEE Computational Intelligence Magazine - May 2020 - 13
IEEE Computational Intelligence Magazine - May 2020 - 14
IEEE Computational Intelligence Magazine - May 2020 - 15
IEEE Computational Intelligence Magazine - May 2020 - 16
IEEE Computational Intelligence Magazine - May 2020 - 17
IEEE Computational Intelligence Magazine - May 2020 - 18
IEEE Computational Intelligence Magazine - May 2020 - 19
IEEE Computational Intelligence Magazine - May 2020 - 20
IEEE Computational Intelligence Magazine - May 2020 - 21
IEEE Computational Intelligence Magazine - May 2020 - 22
IEEE Computational Intelligence Magazine - May 2020 - 23
IEEE Computational Intelligence Magazine - May 2020 - 24
IEEE Computational Intelligence Magazine - May 2020 - 25
IEEE Computational Intelligence Magazine - May 2020 - 26
IEEE Computational Intelligence Magazine - May 2020 - 27
IEEE Computational Intelligence Magazine - May 2020 - 28
IEEE Computational Intelligence Magazine - May 2020 - 29
IEEE Computational Intelligence Magazine - May 2020 - 30
IEEE Computational Intelligence Magazine - May 2020 - 31
IEEE Computational Intelligence Magazine - May 2020 - 32
IEEE Computational Intelligence Magazine - May 2020 - 33
IEEE Computational Intelligence Magazine - May 2020 - 34
IEEE Computational Intelligence Magazine - May 2020 - 35
IEEE Computational Intelligence Magazine - May 2020 - 36
IEEE Computational Intelligence Magazine - May 2020 - 37
IEEE Computational Intelligence Magazine - May 2020 - 38
IEEE Computational Intelligence Magazine - May 2020 - 39
IEEE Computational Intelligence Magazine - May 2020 - 40
IEEE Computational Intelligence Magazine - May 2020 - 41
IEEE Computational Intelligence Magazine - May 2020 - 42
IEEE Computational Intelligence Magazine - May 2020 - 43
IEEE Computational Intelligence Magazine - May 2020 - 44
IEEE Computational Intelligence Magazine - May 2020 - 45
IEEE Computational Intelligence Magazine - May 2020 - 46
IEEE Computational Intelligence Magazine - May 2020 - 47
IEEE Computational Intelligence Magazine - May 2020 - 48
IEEE Computational Intelligence Magazine - May 2020 - 49
IEEE Computational Intelligence Magazine - May 2020 - 50
IEEE Computational Intelligence Magazine - May 2020 - 51
IEEE Computational Intelligence Magazine - May 2020 - 52
IEEE Computational Intelligence Magazine - May 2020 - 53
IEEE Computational Intelligence Magazine - May 2020 - 54
IEEE Computational Intelligence Magazine - May 2020 - 55
IEEE Computational Intelligence Magazine - May 2020 - 56
IEEE Computational Intelligence Magazine - May 2020 - 57
IEEE Computational Intelligence Magazine - May 2020 - 58
IEEE Computational Intelligence Magazine - May 2020 - 59
IEEE Computational Intelligence Magazine - May 2020 - 60
IEEE Computational Intelligence Magazine - May 2020 - 61
IEEE Computational Intelligence Magazine - May 2020 - 62
IEEE Computational Intelligence Magazine - May 2020 - 63
IEEE Computational Intelligence Magazine - May 2020 - 64
IEEE Computational Intelligence Magazine - May 2020 - 65
IEEE Computational Intelligence Magazine - May 2020 - 66
IEEE Computational Intelligence Magazine - May 2020 - 67
IEEE Computational Intelligence Magazine - May 2020 - 68
IEEE Computational Intelligence Magazine - May 2020 - 69
IEEE Computational Intelligence Magazine - May 2020 - 70
IEEE Computational Intelligence Magazine - May 2020 - 71
IEEE Computational Intelligence Magazine - May 2020 - 72
IEEE Computational Intelligence Magazine - May 2020 - 73
IEEE Computational Intelligence Magazine - May 2020 - 74
IEEE Computational Intelligence Magazine - May 2020 - 75
IEEE Computational Intelligence Magazine - May 2020 - 76
IEEE Computational Intelligence Magazine - May 2020 - 77
IEEE Computational Intelligence Magazine - May 2020 - 78
IEEE Computational Intelligence Magazine - May 2020 - 79
IEEE Computational Intelligence Magazine - May 2020 - 80
IEEE Computational Intelligence Magazine - May 2020 - 81
IEEE Computational Intelligence Magazine - May 2020 - 82
IEEE Computational Intelligence Magazine - May 2020 - 83
IEEE Computational Intelligence Magazine - May 2020 - 84
IEEE Computational Intelligence Magazine - May 2020 - 85
IEEE Computational Intelligence Magazine - May 2020 - 86
IEEE Computational Intelligence Magazine - May 2020 - 87
IEEE Computational Intelligence Magazine - May 2020 - 88
IEEE Computational Intelligence Magazine - May 2020 - 89
IEEE Computational Intelligence Magazine - May 2020 - 90
IEEE Computational Intelligence Magazine - May 2020 - 91
IEEE Computational Intelligence Magazine - May 2020 - 92
IEEE Computational Intelligence Magazine - May 2020 - Cover3
IEEE Computational Intelligence Magazine - May 2020 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com