IEEE Computational Intelligence Magazine - May 2020 - 51

private machine learning. Dwork et al.
[19] briefly summarized a limited num-
ber of the most basic problems on differ-
entially private machine learning, includ-
ing the sample complexity, online
learning and empirical risk minimization.
Ji et al. [20] focused on generalizing dif-
ferential privacy mechanisms to tradi-
tional machine learning models, while
missing many newly developed
approaches that update state-of-the-art
benchmarks. Furthermore, both of them
do not cover the advances of differential
privacy in deep learning. Inspired by this,
the purpose of this survey is to present a
systematic and comprehensive overview
of the extensive researches about differ-
entially private machine learning. More
specifically, this survey investigates on
applications of different differential pri-
vacy mechanisms from the perspectives

of both traditional machine learning and
recently booming deep learning. Fig-
ureĀ 2 roughly provides a summary of dif-
ferentially private machine learning
research. In particular, this survey has
three major contributions as follows.
1) We propose a taxonomy of existing
techniques about differentially pri-
vate machine learning. To the best
of our knowledge, we are the first to
investigate the development of dif-
ferentially private deep learning.
2) We provide a detailed and thorough
study of the state-of-the-art methods.
As a result, this survey brings new
perspectives to better understand the
existing works and improve the priva-
cy level of machine learning models.
3) To facilitate the timely and potential
research of this area for researchers
from privacy preserving, especially

Laplace/Gaussian/
Exponential Mechanism

Output/Objective
Perturbation Mechanism

Traditional Machine
Learning

Traditional Machine
Learning

Naive Bayes
Model
Decision Tree
Learning
Boosting
Clustering
Dimensionality
Reduction
Online Learning
Deep Learning
Centralized
Training
Algorithms

machine learning, we summarize the
limitations and challenges of current
research works, and suggest several
promising future research directions.
The rest of this paper is organized as
follows. Section II introduces the related
backgrounds. In Section III, we give a
theoretical description of the application
of differential privacy in traditional
machine learning in detail. Section IV
carefully covers recent models of differen-
tially private deep learning. In Section V,
we discuss the existing challenges and
point out promising future directions. Sec-
tion VI summarizes this review. Due to
the limitation of space, five summary tables
are shown in the supplementary material1.
II. Backgrounds

In this section, we will introduce the def-
inition of differential privacy, the princi-
ple differential privacy mechanisms and
then present a brief overview of machine
learning. The notations used in this sur-
vey are summarized in Table I.
A. Differential Privacy

Differential privacy [14] is a solid priva-
cy-preserving model presented by
Dwork et al. in 2006. It aims to preserve

Linear Regression
Logistic
Regression

1
The supplementary material that includes five summa-
ry tables is available at http://see.xidian.edu.cn/faculty/
mggong/publication.htm

Linear SVM
Kernel SVM

TABLE 1 The common notations
used in this survey.

Deep Learning
Deep
Auto-Encoders
Convolutional
Deep Belief
Networks
DeepWalk

Distributed
Training
Algorithms
Long Short-Term
Memory Networks

NOTATIONS

EXPLANATION

D

DATASET

X

SAMPLE SPACE

Y

OUTPUT SPACE

M

ALGORITHM

n

SIZE OF THE DATASET

d

DIMENSION OF THE SAMPLE SPACE

L

LOSS FUNCTION

e

PRIVACY BUDGET

d

POSSIBILITY OF VIOLATING
e -DIFFERENTIAL PRIVACY

S^ $ h

Generative
Neural Networks

SENSITIVITY

Lap ^ $ h

LAPLACE DISTRIBUTION
2

N (0 , v )

FIGURE 2 The proposed taxonomy to summarize the methods about differentially private
machine learning.

GAUSSIAN DISTRIBUTION
WITH MEAN 0 AND VARIANCE v 2

MAY 2020 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE

51


http://see.xidian.edu.cn/faculty/mggong/publication.htm http://see.xidian.edu.cn/faculty/mggong/publication.htm

IEEE Computational Intelligence Magazine - May 2020

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - May 2020

IEEE Computational Intelligence Magazine - May 2020 - Cover1
IEEE Computational Intelligence Magazine - May 2020 - Cover2
IEEE Computational Intelligence Magazine - May 2020 - 1
IEEE Computational Intelligence Magazine - May 2020 - 2
IEEE Computational Intelligence Magazine - May 2020 - 3
IEEE Computational Intelligence Magazine - May 2020 - 4
IEEE Computational Intelligence Magazine - May 2020 - 5
IEEE Computational Intelligence Magazine - May 2020 - 6
IEEE Computational Intelligence Magazine - May 2020 - 7
IEEE Computational Intelligence Magazine - May 2020 - 8
IEEE Computational Intelligence Magazine - May 2020 - 9
IEEE Computational Intelligence Magazine - May 2020 - 10
IEEE Computational Intelligence Magazine - May 2020 - 11
IEEE Computational Intelligence Magazine - May 2020 - 12
IEEE Computational Intelligence Magazine - May 2020 - 13
IEEE Computational Intelligence Magazine - May 2020 - 14
IEEE Computational Intelligence Magazine - May 2020 - 15
IEEE Computational Intelligence Magazine - May 2020 - 16
IEEE Computational Intelligence Magazine - May 2020 - 17
IEEE Computational Intelligence Magazine - May 2020 - 18
IEEE Computational Intelligence Magazine - May 2020 - 19
IEEE Computational Intelligence Magazine - May 2020 - 20
IEEE Computational Intelligence Magazine - May 2020 - 21
IEEE Computational Intelligence Magazine - May 2020 - 22
IEEE Computational Intelligence Magazine - May 2020 - 23
IEEE Computational Intelligence Magazine - May 2020 - 24
IEEE Computational Intelligence Magazine - May 2020 - 25
IEEE Computational Intelligence Magazine - May 2020 - 26
IEEE Computational Intelligence Magazine - May 2020 - 27
IEEE Computational Intelligence Magazine - May 2020 - 28
IEEE Computational Intelligence Magazine - May 2020 - 29
IEEE Computational Intelligence Magazine - May 2020 - 30
IEEE Computational Intelligence Magazine - May 2020 - 31
IEEE Computational Intelligence Magazine - May 2020 - 32
IEEE Computational Intelligence Magazine - May 2020 - 33
IEEE Computational Intelligence Magazine - May 2020 - 34
IEEE Computational Intelligence Magazine - May 2020 - 35
IEEE Computational Intelligence Magazine - May 2020 - 36
IEEE Computational Intelligence Magazine - May 2020 - 37
IEEE Computational Intelligence Magazine - May 2020 - 38
IEEE Computational Intelligence Magazine - May 2020 - 39
IEEE Computational Intelligence Magazine - May 2020 - 40
IEEE Computational Intelligence Magazine - May 2020 - 41
IEEE Computational Intelligence Magazine - May 2020 - 42
IEEE Computational Intelligence Magazine - May 2020 - 43
IEEE Computational Intelligence Magazine - May 2020 - 44
IEEE Computational Intelligence Magazine - May 2020 - 45
IEEE Computational Intelligence Magazine - May 2020 - 46
IEEE Computational Intelligence Magazine - May 2020 - 47
IEEE Computational Intelligence Magazine - May 2020 - 48
IEEE Computational Intelligence Magazine - May 2020 - 49
IEEE Computational Intelligence Magazine - May 2020 - 50
IEEE Computational Intelligence Magazine - May 2020 - 51
IEEE Computational Intelligence Magazine - May 2020 - 52
IEEE Computational Intelligence Magazine - May 2020 - 53
IEEE Computational Intelligence Magazine - May 2020 - 54
IEEE Computational Intelligence Magazine - May 2020 - 55
IEEE Computational Intelligence Magazine - May 2020 - 56
IEEE Computational Intelligence Magazine - May 2020 - 57
IEEE Computational Intelligence Magazine - May 2020 - 58
IEEE Computational Intelligence Magazine - May 2020 - 59
IEEE Computational Intelligence Magazine - May 2020 - 60
IEEE Computational Intelligence Magazine - May 2020 - 61
IEEE Computational Intelligence Magazine - May 2020 - 62
IEEE Computational Intelligence Magazine - May 2020 - 63
IEEE Computational Intelligence Magazine - May 2020 - 64
IEEE Computational Intelligence Magazine - May 2020 - 65
IEEE Computational Intelligence Magazine - May 2020 - 66
IEEE Computational Intelligence Magazine - May 2020 - 67
IEEE Computational Intelligence Magazine - May 2020 - 68
IEEE Computational Intelligence Magazine - May 2020 - 69
IEEE Computational Intelligence Magazine - May 2020 - 70
IEEE Computational Intelligence Magazine - May 2020 - 71
IEEE Computational Intelligence Magazine - May 2020 - 72
IEEE Computational Intelligence Magazine - May 2020 - 73
IEEE Computational Intelligence Magazine - May 2020 - 74
IEEE Computational Intelligence Magazine - May 2020 - 75
IEEE Computational Intelligence Magazine - May 2020 - 76
IEEE Computational Intelligence Magazine - May 2020 - 77
IEEE Computational Intelligence Magazine - May 2020 - 78
IEEE Computational Intelligence Magazine - May 2020 - 79
IEEE Computational Intelligence Magazine - May 2020 - 80
IEEE Computational Intelligence Magazine - May 2020 - 81
IEEE Computational Intelligence Magazine - May 2020 - 82
IEEE Computational Intelligence Magazine - May 2020 - 83
IEEE Computational Intelligence Magazine - May 2020 - 84
IEEE Computational Intelligence Magazine - May 2020 - 85
IEEE Computational Intelligence Magazine - May 2020 - 86
IEEE Computational Intelligence Magazine - May 2020 - 87
IEEE Computational Intelligence Magazine - May 2020 - 88
IEEE Computational Intelligence Magazine - May 2020 - 89
IEEE Computational Intelligence Magazine - May 2020 - 90
IEEE Computational Intelligence Magazine - May 2020 - 91
IEEE Computational Intelligence Magazine - May 2020 - 92
IEEE Computational Intelligence Magazine - May 2020 - Cover3
IEEE Computational Intelligence Magazine - May 2020 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com