SLIDE 1 Differentially Private Algorithm and Auction Configuration
Ellen Vitercik CMU, Theory Lunch October 11, 2017 Joint work with Nina Balcan and Travis Dick
SLIDE 2
$1
SLIDE 3
$100 Prices learned from purchase histories can reveal information about individual purchases.
SLIDE 4
Prices learned from purchase histories can reveal information about individual purchases. We need a way to privately set prices and design auctions based on purchase histories. $100
SLIDE 5
SLIDE 6
Dear Lab Technician, Please update your default CPLEX parameters to …
SLIDE 7
An attacker can infer information about medical records used to tune those parameters. Suppose a parameter correlates with a certain disease.
SLIDE 8
An attacker can infer information about medical records used to tune those parameters. Suppose a parameter correlates with a certain disease. We need a way to privately configure algorithms.
SLIDE 9
An attacker can infer information about medical records used to tune those parameters. Suppose a parameter correlates with a certain disease. Many works have shown that it is possible to invert a machine learning model to infer sensitive information about its training set.
SLIDE 10 By observing a series of recommendations from websites such as Amazon, an adversary can infer individual users’
- purchases. [Calandrino et al. 2011]
SLIDE 11
It is possible to extract images of training subjects from facial recognition models. The attacker has only the person’s name and access to a facial recognition system that returns a class confidence score. [Fredrikson et al. 2015]
SLIDE 12
It is possible to invert a machine learning model to learn sensitive genomic information about individuals. [Fredrikson et al. 2014]
SLIDE 13
In response, computer scientists have developed private machine learning algorithms.
SLIDE 14
Existing private ML algorithms apply to optimization problems defined by well-studied, well-understood functions.
SLIDE 15
What if the objective is nonconvex and not differentiable?
SLIDE 16
We provide a private algorithm for maximizing data- dependent piecewise Lipschitz functions. Applications in: Algorithm configuration Pricing mechanism and auction design Algorithm configuration and mechanism design reduce to maximizing data-dependent piecewise Lipschitz functions.
SLIDE 17
Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary
SLIDE 18 Learning-based algorithm configuration: Tune algorithm parameters to achieve high performance over a specific application domain. Led to breakthroughs in:
[Leyton-Brown et al., 2009]
[Demmel et al., 2005]
[Caseau et al., 1999]
[Xu et al., 2008]
SLIDE 19
Learning-based algorithm configuration How can I use the set of samples to find an algorithm that’s best for my application domain? Application- Specific Distribution Algorithm Designer Algorithm , … ,
SLIDE 20
We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Greedy algorithm configuration Hard combinatorial problems show up in diverse domains where privacy preservation is crucial.
SLIDE 21
We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Greedy algorithm configuration Hard combinatorial problems show up in diverse domains where privacy preservation is crucial. These are often solved by greedy algorithms where elements are iteratively added to a solution set according to a heuristic. E.g., in knapsack: size of item 𝑗 (value of item 𝑗)
SLIDE 22
We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Greedy algorithm configuration Hard combinatorial problems show up in diverse domains where privacy preservation is crucial. These are often solved by greedy algorithms where elements are iteratively added to a solution set according to a heuristic. E.g., in knapsack: size of item 𝑗 (value of item 𝑗)𝝇 Gupta and Roughgarden [2017] proposed an infinite family of greedy heuristics for the knapsack and max weight independent set problems.
SLIDE 23 We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Greedy algorithm configuration Hard combinatorial problems show up in diverse domains where privacy preservation is crucial. These are often solved by greedy algorithms where elements are iteratively added to a solution set according to a heuristic. E.g., in knapsack: size of item 𝑗 (value of item 𝑗)𝝇 Gupta and Roughgarden [2017] proposed an infinite family of greedy heuristics for the knapsack and max weight independent set problems. Our private algorithm uses sample problem instances to find a nearly
- ptimal greedy heuristic for the
specific application domain. No sensitive information about the training set is revealed.
SLIDE 24 We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Integer quadratic programming algorithm configuration
𝒚𝒋 𝒚𝒌
IQPs are used in many applications where privacy preservation is essential, such as financial portfolio
SLIDE 25 We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Integer quadratic programming algorithm configuration
𝒚𝒋 𝒚𝒌
IQPs are used in many applications where privacy preservation is essential, such as financial portfolio
IQPs are often approximated by solving a semi-definite program and rounding the vectors to integer values. There are many different rounding schemes with varying quality.
SLIDE 26 We show that our private algorithm has strong utility guarantees for many algorithm configuration problems. Integer quadratic programming algorithm configuration
𝒚𝒋 𝒚𝒌
IQPs are used in many applications where privacy preservation is essential, such as financial portfolio
IQPs are often approximated by solving a semi-definite program and rounding the vectors to integer values. There are many different rounding schemes with varying quality. Our private algorithm uses sample IQP instances to find a nearly optimal rounding scheme for the specific application domain. No sensitive information about the training set is revealed.
SLIDE 27
Learning-based mechanism design: Use information about past consumers to design mechanisms that extract high revenue from future consumers. Employed throughout industry. Garnered significant attention in TCS. [Elkind, 2007, Cole and Roughgarden, 2014, Huang et al., 2015, Medina and Mohri, 2014, Morgenstern and Roughgarden, 2015, Devanur et al., 2016, etc.]
SLIDE 28
Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary
SLIDE 29
An algorithm, given an input dataset 𝐸, is differentially private if the following holds: The output reveals (almost) nothing more about a record in 𝐸 than the output would have if the record wasn’t contained in 𝐸.
SLIDE 30
Alice Bob Claire David Algorithm
SLIDE 31
Alice Bob Claire David Algorithm
SLIDE 32
An algorithm is (𝜻, 𝜺)-differentially private if for all pairs of neighboring datasets 𝐸, 𝐸’ and all sets 𝒫 of outputs, ℙ 𝐸 ∈ 𝒫 ≤ 𝑓𝜁ℙ 𝐸′ ∈ 𝒫 + 𝜀 𝑓𝜁 ≈ 1 + 𝜁
SLIDE 33
Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary
SLIDE 34
One good for sale Single-item pricing problem:
SLIDE 35
- Distribution over buyers: ~
- Buyers’ values are denoted as:
- Pricing algorithm receives a set 𝒯 =
, , … , ~ 𝑂
1 𝑂
- Learning theory tells us that this value of 𝜍
asdfd
- approximately maximizes 𝔽
Single-item pricing problem: Revenue , 𝜍 = 𝜍 · 1 ≥ 𝜍 value , value , Revenue , 𝜍 + ··· + Revenue , 𝜍 Revenue , 𝜍
SLIDE 36
𝒯 = ~ average revenue value , = 3 price
SLIDE 37
𝒯 = , ~ 2 average revenue value , = 4 value , = 3 price
SLIDE 38
𝒯 = , ~ 2 average revenue value , = 4 value , = 3 price
SLIDE 39
We want to write an algorithm that gets average revenue as close to $3 as possible while preserving differential privacy. average revenue price
SLIDE 40
We want to write an algorithm that gets average revenue as close to $3 as possible while preserving differential privacy. price average revenue Average utility 𝑉𝒯(𝜍) 𝜍
SLIDE 41
General problem: Given a piecewise utility function 𝑉𝒯 𝜍 , privately find a parameter ො 𝜍 that approximately maximizes 𝑉𝒯 𝜍 . Algorithm 𝓣 = , , 𝑉𝓣 𝜍
SLIDE 42
General problem: Given a piecewise utility function 𝑉𝒯 𝜍 , privately find a parameter ො 𝜍 that approximately maximizes 𝑉𝒯 𝜍 . Algorithm 𝓣 = , , 𝑉𝓣 𝓣′ = , 𝑉𝓣′ 𝜍
SLIDE 43
Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary
SLIDE 44
Ideally, we want to use the exponential mechanism [McSherry and Talwar 2007] Pick a parameter vector 𝝇 with probability proportional to exp 𝑑 ∙ 𝜁 ∙ 𝑉𝒯 𝝇
SLIDE 45
Sampling from exp 𝑑 ∙ 𝜁 ∙ 𝑉𝒯 𝜍 is easy when we can calculate its antiderivative and the parameter space is one-dimensional. price average revenue
SLIDE 46
What about when the parameter space is multi-dimensional?
SLIDE 47
Generally, sampling from a multi-dimensional distribution is hard.
SLIDE 48
Existing efficient sampling techniques work for logconcave distributions. [Lovász and Vempala 2006, 2007, Bassily et al. 2014] When 𝑉𝒯 𝝇 is piecewise concave, exp 𝑑 ∙ 𝜁 ∙ 𝑉𝒯 𝝇 is logconcave on each piece.
SLIDE 49 Suppose 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz and concave over convex regions in ℝ𝑒.
jhkj
There is an 𝜁, 𝜀 -DP algorithm that approximately maximizes 𝑉𝒯 𝝇 . Its running time polynomial in 𝑒, 𝑀, 𝜁−1, log 𝜀−1, and |𝒯|. Theorem (part 1)
SLIDE 50
Step 1: Estimate the probability mass that the exponential mechanism places on each piecewise portion of the domain. This requires an integral estimation algorithm. [Lovász and Vempala ‘07]
SLIDE 51
Step 2: Sample a portion of the domain according to that probability.
SLIDE 52
Step 3: Sample a point in that portion of the domain with probability approximately according to the exponential mechanism: exp 𝑑 ∙ 𝜁 ∙ 𝑉𝒯 𝝇 This requires approximate sampling [Bassily et al. 2014]
SLIDE 53
Proof sketch: Show that the output distribution is almost exp 𝑑 ∙ 𝜁 ∙ 𝑉𝒯 𝝇 . Since the exponential mechanism is (𝜁, 0)-differentially private, our algorithm is (𝑃(𝜁), 𝜺)-differentially private. Lemma [Bassily et al. 2014] If an algorithm ’s output distribution is ǁ 𝜁-close to that of a (𝜁, 0)-differentially private algorithm for every input dataset 𝒯, then is (2 ǁ 𝜁 + 𝜁, 0)-differentially private. (Close under the metric 𝐸∞ 𝜈𝑔, 𝜈 = sup log 𝑔(𝑦)/(𝑦) .)
SLIDE 54 Suppose 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz and concave over convex regions in ℝ𝑒.
jhkj
There is an 𝜁, 𝜀 -DP algorithm that approximately maximizes 𝑉𝒯 𝝇 . Its running time polynomial in 𝑒, 𝑀, 𝜁−1, log 𝜀−1, and |𝒯|. Theorem (part 1)
SLIDE 55 Suppose 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz and concave over convex regions in ℝ𝑒.
jhkj
There is an 𝜁, 𝜀 -DP algorithm that approximately maximizes 𝑉𝒯 𝝇 . Its running time polynomial in 𝑒, 𝑀, 𝜁−1, log 𝜀−1, and |𝒯|. Theorem (part 1)
SLIDE 56
Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary
SLIDE 57
Suppose 𝑉𝒯 𝝇 is (𝒙, 𝒍)-dispersed, piecewise 𝑀-Lipschitz, and the parameter space is contained in a ball of radius 𝑆. Let ෝ 𝝇 ∈ ℝ𝑒 be the parameter vector output by our 𝜁, 𝜀 -DP algorithm. With probability at least 1 − 𝛿, 𝑉𝒯 ෝ 𝝇 ≥ max 𝑉𝒯 𝝇 − 𝑃 𝐼 |𝒯|𝜁 𝑒 log 𝑆 𝑥 + log 1 𝛿 + 𝑀𝑥 + 𝐼𝑙 |𝒯| (𝑉𝒯 𝝇 is an average of functions with range in 0, 𝐼 .) Theorem (part 2)
SLIDE 58
Every private algorithm needs to add some noise to the parameter it outputs.
SLIDE 59
Therefore, nearby parameters should have similar utilities.
SLIDE 60
We often guarantee that nearby parameters have similar utilities by assuming the utility function is “nice.”
SLIDE 61
What does it mean for a piecewise function to be “nice”? 𝑉𝒯 𝝇 𝝇 𝑉𝒯 𝝇
SLIDE 62
What does it mean for a piecewise function to be “nice”? 𝝇 𝑉𝒯 𝝇
SLIDE 63 Let 𝒬 = 𝑄
1, … , 𝑄𝑢 be a partition of the parameter space such
that 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz within each 𝑄𝑗. 𝑉𝒯 is 𝒙, 𝒍 -dispersed if for any ball ℬ of radius 𝑥, the number
- f sets in 𝒬 that intersect ℬ is at most 𝑙.
𝝇 𝑉𝒯 𝝇
SLIDE 64 Let 𝒬 = 𝑄
1, … , 𝑄𝑢 be a partition of the parameter space such
that 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz within each 𝑄𝑗. 𝑉𝒯 is 𝒙, 𝒍 -dispersed if for any ball ℬ of radius 𝑥, the number
- f sets in 𝒬 that intersect ℬ is at most 𝑙.
𝝇 𝑉𝒯 𝝇 𝑄
1
𝑄2 𝑄3 𝑄
4
𝑄5 𝑄6 𝑄
7
SLIDE 65 𝝇 𝑉𝒯 𝝇 Let 𝒬 = 𝑄
1, … , 𝑄𝑢 be a partition of the parameter space such
that 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz within each 𝑄𝑗. 𝑉𝒯 is 𝒙, 𝒍 -dispersed if for any ball ℬ of radius 𝑥, the number
- f sets in 𝒬 that intersect ℬ is at most 𝑙.
1 (1, 3)- dispersed
SLIDE 66
Suppose 𝑉𝒯 𝝇 is (𝒙, 𝒍)-dispersed, piecewise 𝑀-Lipschitz, and the parameter space is contained in a ball of radius 𝑆. Let ෝ 𝝇 ∈ ℝ𝑒 be the parameter vector output by our 𝜁, 𝜀 -DP algorithm. With probability at least 1 − 𝛿, 𝑉𝒯 ෝ 𝝇 ≥ max 𝑉𝒯 𝝇 − 𝑃 𝐼 |𝒯|𝜁 𝑒 log 𝑆 𝒙 + log 1 𝛿 + 𝑀𝒙 + 𝐼𝒍 |𝒯| (𝑉𝒯 𝝇 is an average of functions with range in 0, 𝐼 .) Theorem (part 2)
SLIDE 67 𝝇 𝑉𝒯 𝝇 Let 𝒬 = 𝑄
1, … , 𝑄𝑢 be a partition of the parameter space such
that 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz within each 𝑄𝑗. 𝑉𝒯 is 𝒙, 𝒍 -dispersed if for any ball ℬ of radius 𝑥, the number
- f sets in 𝒬 that intersect ℬ is at most 𝑙.
1 (1, 3)- dispersed
SLIDE 68 𝝇 𝑉𝒯 𝝇 Let 𝒬 = 𝑄
1, … , 𝑄𝑢 be a partition of the parameter space such
that 𝑉𝒯 𝝇 is piecewise 𝑀-Lipschitz within each 𝑄𝑗. 𝑉𝒯 is 𝒙, 𝒍 -dispersed if for any ball ℬ of radius 𝑥, the number
- f sets in 𝒬 that intersect ℬ is at most 𝑙.
2 (2, 4)- dispersed
SLIDE 69
Suppose 𝑉𝒯 𝝇 is (𝒙, 𝒍)-dispersed, piecewise 𝑀-Lipschitz, and the parameter space is contained in a ball of radius 𝑆. Let ෝ 𝝇 ∈ ℝ𝑒 be the parameter vector output by our 𝜁, 𝜀 -DP algorithm. With probability at least 1 − 𝛿, 𝑉𝒯 ෝ 𝝇 ≥ max 𝑉𝒯 𝝇 − 𝑃 𝐼 |𝒯|𝜁 𝑒 log 𝑆 𝒙 + log 1 𝛿 + 𝑀𝒙 + 𝐼𝒍 |𝒯| (𝑉𝒯 𝝇 is an average of functions with range in 0, 𝐼 .) Theorem (part 2)
SLIDE 70
Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary
SLIDE 71 Multi-item pricing problem:
SLIDE 72 Distribution over buyers: ~
- Buyers’ values are denoted as:
- asdf
asdf
- Pricing algorithm receives a set 𝒯 =
, , … , ~ 𝑂
1 𝑂
Multi-item pricing problem:
- Revenue , 𝝇 + ··· + Revenue , 𝝇
value , value , Revenue , 𝝇 = 𝜍1 · 1 ≥ 𝜍1 value , + 𝜍2 · 1 ≥ 𝜍2 value ,
SLIDE 73 The average revenue over 𝒯 = , , … , of a pricing
aesfe
mechanism is piecewise linear and 1-Lipschitz. 𝑉𝒯 𝝇 = average revenue 𝜍1 = price 𝜍2 = price
SLIDE 74 How dispersed is 𝑉𝒯 𝝇 ? 𝑉𝒯 𝝇 = average revenue 𝜍1 𝜍2
𝑗(𝑤) be the density of the
distribution over the “typical” buyer’s value for item 𝑗.
- Suppose there are 𝑛 items
and max
𝑗,𝑤 𝑔 𝑗(𝑤) ≤ 𝜆.
With probability at least 1 − 𝛿, 𝑉𝒯 𝝇 is 𝑥, 𝑙 -dispersed with 𝑥 =
𝛿 |𝒯|𝜆 𝑛 and 𝑙 = 𝑛.
SLIDE 75
𝑗(𝑤) be the density of the
distribution over the “typical” buyer’s value for item 𝑗.
- Suppose there are 𝑛 items
and max
𝑗,𝑤 𝑔 𝑗(𝑤) ≤ 𝜆.
Let ෝ 𝝇 ∈ ℝ𝑛 be the price vector
- utput by our DP algorithm.
With probability 1 − 𝛿, 𝑉𝒯 ෝ 𝝇 ≥ max 𝑉𝒯 𝝇 − ෨ 𝑃 𝐼𝑛 |𝒯|𝜁 + 𝛿 |𝒯|𝜆 𝑛 𝜍1 𝜍2 𝑉𝒯 𝝇 = average revenue
SLIDE 76
We also show that our DP algorithm has strong utility guarantees for many mechanism design problems. Multiple bidders Buyers with unit-demand valuations Buyers with general valuations 2nd price auctions with reserve prices
SLIDE 77
Introduction Setup Overview: Algorithm configuration and auction design Differential privacy Private pricing design The algorithm Privacy guarantees Utility guarantees Example: private multi-item pricing Summary
SLIDE 78
Utility function Parameter Dimension Privacy guarantee Efficiency Piecewise concave and Lipschitz Multiple (𝜁, 𝜀) Piecewise Lipschitz Single (𝜁, 0) Piecewise Lipschitz Multiple (𝜁, 0) We provide a private algorithm for maximizing data- dependent piecewise Lipschitz functions.
SLIDE 79
Questions?