Bing-Rong Lin
Pennsylvania State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Bing-Rong Lin.
ACM Transactions on Knowledge Discovery From Data | 2015
Bing-Rong Lin; Daniel Kifer
In statistical privacy, utility refers to two concepts: information preservation, how much statistical information is retained by a sanitizing algorithm, and usability, how (and with how much difficulty) one extracts this information to build statistical models, answer queries, and so forth. Some scenarios incentivize a separation between information preservation and usability, so that the data owner first chooses a sanitizing algorithm to maximize a measure of information preservation, and, afterward, the data consumers process the sanitized output according to their various individual needs [Ghosh et al. 2009; Williams and McSherry 2010]. We analyze the information-preserving properties of utility measures with a combination of two new and three existing utility axioms and study how violations of an axiom can be fixed. We show that the average (over possible outputs of the sanitizer) error of Bayesian decision makers forms the unique class of utility measures that satisfy all of the axioms. The axioms are agnostic to Bayesian concepts such as subjective probabilities and hence strengthen support for Bayesian views in privacy research. In particular, this result connects information preservation to aspects of usability—if the information preservation of a sanitizing algorithm should be measured as the average error of a Bayesian decision maker, shouldn’t Bayesian decision theory be a good choice when it comes to using the sanitized outputs for various purposes? We put this idea to the test in the unattributed histogram problem where our decision-theoretic postprocessing algorithm empirically outperforms previously proposed approaches.
ieee global conference on signal and information processing | 2013
Bing-Rong Lin; Daniel Kifer
One of the important challenges in statistical privacy is the design of algorithms that maximize a utility measure subject to restrictions imposed by privacy considerations. In this paper we examine large classes of privacy definitions and utility measures. We identify their geometric characteristics and some common properties of optimal privacy-preserving algorithms.
international workshop on information forensics and security | 2012
Bing-Rong Lin; Ye Wang; Shantanu Rane
Alice and Bob are mutually untrusting curators who possess separate databases containing information about a set of respondents. This data is to be sanitized and published to enable accurate statistical analysis, while retaining the privacy of the individual respondents in the databases. Further, an adversary who looks at the published data must not even be able to compute statistical measures on it. Only an authorized researcher should be able to compute marginal and joint statistics. This work is an attempt toward providing a theoretical formulation of privacy and utility for problems of this type. Privacy of the individual respondents is formulated using ϵ-differential privacy. Privacy of the marginal and joint statistics on the distributed databases is formulated using a new model called δ-distributional ϵ-differential privacy. Finally, a constructive scheme based on randomized response is presented as an example mechanism that satisfies the formulated privacy requirements.
symposium on principles of database systems | 2010
Daniel Kifer; Bing-Rong Lin
Archive | 2004
Yu-Chee Tseng; Chih-Yu Lin; Bing-Rong Lin
Journal of Privacy and Confidentiality | 2012
Daniel Kifer; Bing-Rong Lin
very large data bases | 2014
Bing-Rong Lin; Daniel Kifer
IEEE Journal on Selected Areas in Communications | 2005
Yu-Chee Tseng; Ting-Yu Lin; Yen-Ku Liu; Bing-Rong Lin
international conference on management of data | 2013
Bing-Rong Lin; Daniel Kifer
Archive | 2004
Bing-Rong Lin; Chih-Yu Lin; Yu-Chee Tseng; 柄榕 林; 致宇 林