{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:09:48Z","timestamp":1740175788394,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T00:00:00Z","timestamp":1735344000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T00:00:00Z","timestamp":1735344000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFA1000102"],"award-info":[{"award-number":["2021YFA1000102"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["No.23CX03012A"],"award-info":[{"award-number":["No.23CX03012A"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Transfer learning, as a machine learning approach to enhance model generalization, has found widespread applications across various domains. However, the risk of privacy leakage during the transfer process remains a crucial consideration. Differential privacy, with its rigorous mathematical foundations, has been proven to offer consistent and robust privacy protection. This study delves into the problem of linear regression transfer learning under differential privacy and, on this basis, proposes a novel strategy incorporating prior information as a constraint to further enhance model performance and stability. In scenarios where the transferable source is known, a two-step transfer learning algorithm incorporating prior information is proposed. This approach leverages prior knowledge to effectively constrain the model parameters, ensuring that the solution space remains reasonable throughout the transfer process. For cases where transferable sources are unknown, a non-algorithmic, cross-validation-based method for transferable source detection is introduced to mitigate adverse impacts stemming from non-informative sources. The effectiveness of the proposed algorithms is validated through simulations and real-world data experiments.<\/jats:p>","DOI":"10.1007\/s40747-024-01759-8","type":"journal-article","created":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T09:08:27Z","timestamp":1735376907000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Transfer learning for linear regression with differential privacy"],"prefix":"10.1007","volume":"11","author":[{"given":"Yiming","family":"Hou","sequence":"first","affiliation":[]},{"given":"Yunquan","family":"Song","sequence":"additional","affiliation":[]},{"given":"Zhijian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,28]]},"reference":[{"issue":"2","key":"1759_CR1","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1080\/10618600.2018.1538881","volume":"28","author":"AF Barrientos","year":"2019","unstructured":"Barrientos AF, Reiter JP, Machanavajjhala A, Chen Y (2019) Differentially private significance tests for regression coefficients. Journal of Computational and Graphical Statistics 28(2):440\u2013453","journal-title":"Journal of Computational and Graphical Statistics"},{"issue":"5","key":"1759_CR2","doi-asserted-by":"publisher","first-page":"2964","DOI":"10.1287\/mnsc.2020.3729","volume":"67","author":"H Bastani","year":"2021","unstructured":"Bastani H (2021) Predicting with proxies: Transfer learning in high dimension. Management Science 67(5):2964\u20132984","journal-title":"Management Science"},{"key":"1759_CR3","unstructured":"Bianchi A, Vendra MR, Protopapas P, Brambilla M (2019) Improving image classification robustness through selective cnn-filters fine-tuning. arXiv preprint arXiv:1904.03949"},{"key":"1759_CR4","unstructured":"Bojarski M, Del\u00a0Testa D, Dworakowski D, Firner B, Flepp B, Goyal P, Jackel LD, Monfort M, Muller U, Zhang J et\u00a0al (2016) End to end learning for self-driving cars. arXiv preprint arXiv:1604.07316"},{"key":"1759_CR5","unstructured":"Bun M, Carmosino ML, Sorrell J (2020) Efficient, noise-tolerant, and private learning via boosting. In Conference on Learning Theory, pages 1031\u20131077. PMLR"},{"issue":"5","key":"1759_CR6","doi-asserted-by":"publisher","first-page":"2825","DOI":"10.1214\/21-AOS2058","volume":"49","author":"TT Cai","year":"2021","unstructured":"Cai TT, Wang Y, Zhang L (2021) The cost of privacy: Optimal rates of convergence for parameter estimation with differential privacy. The Annals of Statistics 49(5):2825\u20132850","journal-title":"The Annals of Statistics"},{"key":"1759_CR7","unstructured":"Chaudhuri K, Monteleoni C, Sarwate AD (2011) Differentially private empirical risk minimization. Journal of Machine Learning Research, 12(3)"},{"key":"1759_CR8","doi-asserted-by":"crossref","unstructured":"Dwork C, Roth A et\u00a0al (2014) The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, 9(3\u20134):211\u2013407","DOI":"10.1561\/0400000042"},{"key":"1759_CR9","doi-asserted-by":"crossref","unstructured":"Fawaz HI, Forestier G, Weber J, Idoumghar L, Muller P-A (2018) Transfer learning for time series classification. In 2018 IEEE international conference on big data (Big Data), pages 1367\u20131376. IEEE","DOI":"10.1109\/BigData.2018.8621990"},{"key":"1759_CR10","doi-asserted-by":"crossref","unstructured":"Gyorfi L, Ottucsak G, Walk H (2012) Machine learning for financial engineering. Machine learning for financial engineering","DOI":"10.1142\/9781848168145"},{"key":"1759_CR11","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.csda.2014.12.010","volume":"86","author":"Q Hu","year":"2015","unstructured":"Hu Q, Zeng P, Lin L (2015) The dual and degrees of freedom of linearly constrained generalized lasso. Computational Statistics & Data Analysis 86:13\u201326","journal-title":"Computational Statistics & Data Analysis"},{"key":"1759_CR12","unstructured":"Kifer D, Smith A, Thakurta A (2012) Private convex empirical risk minimization and high-dimensional regression. In Conference on Learning Theory, pages 25\u20131. JMLR Workshop and Conference Proceedings"},{"key":"1759_CR13","unstructured":"Kohen R, Sheffet O (2022) Transfer learning in differential privacy\u2019s hybrid-model. In International Conference on Machine Learning, pages 11413\u201311429. PMLR"},{"key":"1759_CR14","unstructured":"Lei J (2011) Differentially private m-estimators. Advances in neural information processing systems, 24"},{"issue":"1","key":"1759_CR15","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1111\/rssb.12479","volume":"84","author":"S Li","year":"2022","unstructured":"Li S, Cai TT, Li H (2022) Transfer learning for high-dimensional linear regression: Prediction, estimation and minimax optimality. Journal of the Royal Statistical Society Series B: Statistical Methodology 84(1):149\u2013173","journal-title":"Journal of the Royal Statistical Society Series B: Statistical Methodology"},{"key":"1759_CR16","unstructured":"Lin H, Reimherr M (2022) On transfer learning in functional linear regression. arXiv preprint arXiv:2206.04277"},{"key":"1759_CR17","doi-asserted-by":"crossref","unstructured":"Luo Z, Wu DJ, Adeli E, Fei-Fei L (2021) Scalable differential privacy with sparse network finetuning. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pages 5059\u20135068","DOI":"10.1109\/CVPR46437.2021.00502"},{"key":"1759_CR18","unstructured":"Papernot N, Abadi M, Erlingsson U, Goodfellow I, Talwar K (2016) Semi-supervised knowledge transfer for deep learning from private training data. arXiv preprint arXiv:1610.05755"},{"key":"1759_CR19","unstructured":"Pratt LY (1992) Discriminability-based transfer between neural networks. Advances in neural information processing systems, 5"},{"key":"1759_CR20","doi-asserted-by":"crossref","unstructured":"Rai R, Tiwari MK, Ivanov D, Dolgui A (2021) Machine learning in manufacturing and industry 4.0 applications","DOI":"10.1080\/00207543.2021.1956675"},{"key":"1759_CR21","doi-asserted-by":"crossref","unstructured":"Smith A (2011) Privacy-preserving statistical estimation with optimal convergence rates. In Proceedings of the forty-third annual ACM symposium on Theory of computing, pages 813\u2013822","DOI":"10.1145\/1993636.1993743"},{"key":"1759_CR22","doi-asserted-by":"crossref","unstructured":"Stein CM (1981) Estimation of the mean of a multivariate normal distribution. The annals of Statistics, pages 1135\u20131151","DOI":"10.1214\/aos\/1176345632"},{"key":"1759_CR23","doi-asserted-by":"crossref","unstructured":"Sweeney L (2002) k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems","DOI":"10.1142\/S0218488502001648"},{"key":"1759_CR24","doi-asserted-by":"crossref","unstructured":"Thrun S (1995) Is learning the n-th thing any easier than learning the first? Advances in neural information processing systems, 8","DOI":"10.21236\/ADA285342"},{"key":"1759_CR25","unstructured":"Tian Y, Feng Y (2022) Transfer learning under high-dimensional generalized linear models. Journal of the American Statistical Association, pages 1\u201314"},{"key":"1759_CR26","doi-asserted-by":"publisher","first-page":"3093","DOI":"10.1109\/TIFS.2020.2983254","volume":"15","author":"Q Wang","year":"2020","unstructured":"Wang Q, Li Z, Zou Q, Zhao L, Wang S (2020) Deep domain adaptation with differential privacy. IEEE Transactions on Information Forensics and Security 15:3093\u20133106","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1759_CR27","unstructured":"Yang F, Zhang HR, Wu S, Su WJ, R\u00e9 C (2020) Analysis of information transfer from heterogeneous sources via precise high-dimensional asymptotics. arXiv preprint arXiv:2010.11750"},{"issue":"12","key":"1759_CR28","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1038\/s41551-022-00898-y","volume":"6","author":"A Zhang","year":"2022","unstructured":"Zhang A, Xing L, Zou J, Wu JC (2022) Shifting machine learning for healthcare from development to deployment and from models to data. Nature Biomedical Engineering 6(12):1330\u20131345","journal-title":"Nature Biomedical Engineering"},{"key":"1759_CR29","doi-asserted-by":"crossref","unstructured":"Zhang J, Zhang Z, Xiao X, Yang Y, Winslett M (2012) Functional mechanism: Regression analysis under differential privacy. arXiv preprint arXiv:1208.0219","DOI":"10.14778\/2350229.2350253"},{"key":"1759_CR30","unstructured":"Zhou D, Liu M, Li M, Cai T (2022) Doubly robust augmented model accuracy transfer inference with high dimensional features. arXiv preprint arXiv:2208.05134"},{"key":"1759_CR31","doi-asserted-by":"crossref","unstructured":"Zhu Y, Yu X, Chandraker M, Wang Y-X (2020) Private-knn: Practical differential privacy for computer vision. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pages 11854\u201311862","DOI":"10.1109\/CVPR42600.2020.01187"},{"key":"1759_CR32","doi-asserted-by":"crossref","unstructured":"Zhu Z, Li Y, Li R, Gu X (2018) Distant domain adaptation for text classification. In Knowledge Science, Engineering and Management: 11th International Conference, KSEM 2018, Changchun, China, August 17\u201319, 2018, Proceedings, Part I 11, pages 55\u201366. Springer","DOI":"10.1007\/978-3-319-99365-2_5"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01759-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01759-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01759-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T20:19:43Z","timestamp":1738268383000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01759-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,28]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1759"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01759-8","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2024,12,28]]},"assertion":[{"value":"8 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"100"}}