{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:08:00Z","timestamp":1753880880783,"version":"3.41.2"},"reference-count":42,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","funder":[{"name":"Open Project Foundation of Intelligent Information Processing Key Laboratory of Shanxi Province","award":["CICIP2018002"],"award-info":[{"award-number":["CICIP2018002"]}]},{"name":"National Key Research and Development Program of China","award":["2020YFA0714200"],"award-info":[{"award-number":["2020YFA0714200"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Wavelets Multiresolut Inf. Process."],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p> Distributed learning is a very effective divide-and-conquer strategy for dealing with big data. As distributed learning algorithms become more and more mature, network security issues including the risk of privacy disclosure of personal sensitive data, have attracted high attention and vigilance. Differentially private is an important method that maximizes the accuracy of a data query while minimizing the chance of identifying its records when querying from the given data. The known differentially private distributed learning algorithms are based on variable perturbation, but the variable perturbation method may be non-convergence and the experimental results usually have large deviations. Therefore, in this paper, we consider differentially private distributed learning algorithm based on objective function perturbation. We first propose a new distributed logistic regression algorithm based on objective function perturbation (DLR-OFP). We prove that the proposed DLR-OFP satisfies differentially private, and obtain its fast convergence rate by introducing a new acceleration factor for the gradient descent method. The numerical experiments based on benchmark data show that the proposed DLR-OFP algorithm has fast convergence rate and better privacy protection ability. <\/jats:p>","DOI":"10.1142\/s0219691322500436","type":"journal-article","created":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T14:30:26Z","timestamp":1668177026000},"source":"Crossref","is-referenced-by-count":0,"title":["Differentially private distributed logistic regression with the objective function perturbation"],"prefix":"10.1142","volume":"21","author":[{"given":"Haibo","family":"Yang","sequence":"first","affiliation":[{"name":"School of Mathematics and Statistics, Hubei Key Laboratory of Applied Mathematics, Hubei, University, Wuhan 430062, P. R. China"}]},{"given":"Yulong","family":"Ji","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Hubei Key Laboratory of Applied Mathematics, Hubei, University, Wuhan 430062, P. R. China"}]},{"given":"Yanfeng","family":"Pan","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Hubei Key Laboratory of Applied Mathematics, Hubei, University, Wuhan 430062, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8649-1538","authenticated-orcid":false,"given":"Bin","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Hubei Key Laboratory of Applied Mathematics, Hubei, University, Wuhan 430062, P. R. China"}]},{"given":"Yingxiong","family":"Fu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Hubei Key Laboratory of Applied Mathematics, Hubei, University, Wuhan 430062, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2022,11,10]]},"reference":[{"key":"S0219691322500436BIB001","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"S0219691322500436BIB002","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2016.06.011"},{"key":"S0219691322500436BIB004","first-page":"331","volume":"25","author":"Beck A.","year":"2017","journal-title":"SIAM-Soc. Indust. Appl. Math."},{"issue":"2","key":"S0219691322500436BIB005","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2450142.2450148","volume":"60","author":"Blum A.","year":"2013","journal-title":"J. ACM"},{"volume-title":"Distributed Optimization and Statistical Learning Via the Alternating Direction Method of Multipliers","year":"2011","author":"Boyd S.","key":"S0219691322500436BIB006"},{"key":"S0219691322500436BIB007","first-page":"289","volume":"8","author":"Chaudhuri K.","year":"2008","journal-title":"Neural Inform. Process. Syst."},{"key":"S0219691322500436BIB008","first-page":"1069","volume":"12","author":"Chaudhuri K.","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"S0219691322500436BIB009","first-page":"20","volume-title":"2012 IEEE 28th Int. Conf. Data Engineering","author":"Cormode G.","year":"2012"},{"key":"S0219691322500436BIB010","first-page":"1","volume-title":"Int. Colloquium on Automata, Languages, and Programming, ICALP","author":"Dwork C.","year":"2006"},{"key":"S0219691322500436BIB011","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"S0219691322500436BIB012","first-page":"1054","volume-title":"Proc. ACM Conf. Computer and Communications Security","author":"Erlingsson \u00da.","year":"2014"},{"issue":"9","key":"S0219691322500436BIB013","doi-asserted-by":"crossref","first-page":"2094","DOI":"10.1109\/TKDE.2013.96","volume":"26","author":"Fan L.","year":"2013","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"12","key":"S0219691322500436BIB014","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.14778\/2732977.2732989","volume":"7","author":"Georgios K.","year":"2014","journal-title":"Proc. VLDB Endowment"},{"issue":"1","key":"S0219691322500436BIB015","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/TAC.2016.2541298","volume":"62","author":"Han S.","year":"2016","journal-title":"IEEE Trans. Autom. Control"},{"key":"S0219691322500436BIB016","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1109\/TIFS.2019.2931068","volume":"15","author":"Huang Z.","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Security"},{"volume-title":"SIGKDD Workshop on Mining and Learning from Time Series","year":"2016","author":"Ioannidis S.","key":"S0219691322500436BIB017"},{"key":"S0219691322500436BIB018","doi-asserted-by":"publisher","DOI":"10.1186\/1755-8794-7-S1-S14"},{"key":"S0219691322500436BIB019","first-page":"1","volume-title":"25th Annual Conf. Learning Theory","volume":"23","author":"Kifer D.","year":"2012"},{"key":"S0219691322500436BIB020","first-page":"106","volume-title":"2007 IEEE 23rd Int. Conf. Data Engineering","author":"Li N.","year":"2007"},{"key":"S0219691322500436BIB021","doi-asserted-by":"publisher","DOI":"10.2200\/S00735ED1V01Y201609SPT018"},{"issue":"2","key":"S0219691322500436BIB022","first-page":"124","volume":"37","author":"Li H.","year":"2016","journal-title":"J. Commun."},{"volume-title":"Distributed Machine Learning: Theories, Algorithms and Systems","year":"2018","author":"Liu T.","key":"S0219691322500436BIB023"},{"key":"S0219691322500436BIB024","first-page":"24","volume-title":"Proc. IEEE 22nd Int. Conf. Data Engineering (ICDE\u201906)","author":"Machanavajjhala A.","year":"2006"},{"key":"S0219691322500436BIB025","first-page":"94","volume-title":"48th Annual IEEE Symp. Foundations of Computer Science (FOCS\u201907)","author":"McSherry F.","year":"2007"},{"key":"S0219691322500436BIB026","first-page":"372","volume":"27","author":"Nesterov Y.","year":"1983","journal-title":"Sov. Math. Dokl."},{"key":"S0219691322500436BIB027","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/GlobalSIP.2013.6736861","volume-title":"2013 IEEE Global Conf. Signal and Information Processing","author":"Song S.","year":"2013"},{"key":"S0219691322500436BIB028","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"S0219691322500436BIB029","doi-asserted-by":"crossref","first-page":"7339","DOI":"10.1109\/CDC40024.2019.9029938","volume-title":"2019 IEEE 58th Conf. Decision and Control (CDC)","author":"Wang X.","year":"2019"},{"key":"S0219691322500436BIB030","doi-asserted-by":"crossref","first-page":"1511","DOI":"10.1360\/N112018-00214","volume":"50","author":"Wang P.","year":"2020","journal-title":"Sci. Sin. Inform."},{"key":"S0219691322500436BIB031","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"S0219691322500436BIB032","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1109\/SP40000.2020.00025","volume-title":"2020 IEEE Symp. Security and Privacy (SP)","author":"Wu N.","year":"2020"},{"issue":"8","key":"S0219691322500436BIB033","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TKDE.2010.247","volume":"23","author":"Xiao X.","year":"2010","journal-title":"IEEE Trans. Knowledge Data Eng."},{"issue":"6","key":"S0219691322500436BIB034","doi-asserted-by":"crossref","first-page":"4560","DOI":"10.1109\/JIOT.2020.3027586","volume":"8","author":"Xiao Y.","year":"2021","journal-title":"IEEE Int. Things J."},{"issue":"1","key":"S0219691322500436BIB035","first-page":"101","volume":"37","author":"Xiong P.","year":"2014","journal-title":"Jisuanji Xuebao\/Chin. J. Comput."},{"issue":"11","key":"S0219691322500436BIB036","doi-asserted-by":"crossref","first-page":"2230","DOI":"10.1109\/TSMC.2018.2791511","volume":"49","author":"Xu J.","year":"2018","journal-title":"IEEE Trans. Syst. Man Cybern.: Syst."},{"key":"S0219691322500436BIB037","doi-asserted-by":"crossref","first-page":"5474","DOI":"10.1109\/BigData52589.2021.9671502","volume-title":"2021 IEEE Int. Conf. Big Data (Big Data)","author":"Xu D.","year":"2021"},{"key":"S0219691322500436BIB038","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1200\/CCI.19.00047","volume":"4","author":"Zerka F.","year":"2020","journal-title":"JCO Clinic. Cancer Inform."},{"key":"S0219691322500436BIB039","first-page":"5796","volume-title":"Proceedings of the 35th International Conference on Machine Learning, PMLR","volume":"80","author":"Zhang X.","year":"2018"},{"key":"S0219691322500436BIB040","first-page":"927","volume":"4","author":"Zhang X.","year":"2014","journal-title":"Chin. J. Comput."},{"issue":"1","key":"S0219691322500436BIB041","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/TIFS.2016.2607691","volume":"12","author":"Zhang T.","year":"2016","journal-title":"IEEE Trans. Inf. Forens. Security"},{"key":"S0219691322500436BIB042","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2009.00847"},{"issue":"8","key":"S0219691322500436BIB043","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1109\/TKDE.2017.2697856","volume":"29","author":"Zhu T.","year":"2017","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["International Journal of Wavelets, Multiresolution and Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219691322500436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T05:08:02Z","timestamp":1670389682000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219691322500436"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,10]]},"references-count":42,"journal-issue":{"issue":"01","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1142\/S0219691322500436"],"URL":"https:\/\/doi.org\/10.1142\/s0219691322500436","relation":{},"ISSN":["0219-6913","1793-690X"],"issn-type":[{"type":"print","value":"0219-6913"},{"type":"electronic","value":"1793-690X"}],"subject":[],"published":{"date-parts":[[2022,11,10]]},"article-number":"2250043"}}