1,411
Views
0
CrossRef citations to date
0
Altmetric
Recent Advances in Parallel and Distributed Computing and Applications

A multimodal differential privacy framework based on fusion representation learning

, ORCID Icon &
Pages 2219-2239 | Received 22 May 2022, Accepted 04 Aug 2022, Published online: 25 Aug 2022

References

  • Acs, G., Castelluccia, C., & Chen, R.2012). Differentially private histogram publishing through lossy compression. In 2012 IEEE 12th International Conference on Data Mining (pp. 1–10). IEEE.
  • Atrey, P. K., Hossain, M. A., El Saddik, A., & Kankanhalli, M. S. (2010). Multimodal fusion for multimedia analysis: A survey. Multimedia Systems, 16(6), 345–379. https://doi.org/10.1007/s00530-010-0182-0
  • Baltrušaitis, T., Ahuja, C., & Morency, L. P. (2018). Multimodal machine learning: A survey and taxonomy. IEEE Transactions on Pattern Analysis and Machine Intelligence, 41(2), 423–443. https://doi.org/10.1109/TPAMI.2018.2798607
  • Bao, E., Yang, Y., Xiao, X., & Ding, B. (2021). CGM: An enhanced mechanism for streaming data collection with local differential privacy. Proceedings of the VLDB Endowment, 14(11), 2258–2270. https://doi.org/10.14778/3476249.3476277
  • Busso, C., Bulut, M., Lee, C. C., Kazemzadeh, A., Mower, E., Kim, S., Chang, J. N., Lee, S., & Narayanan, S. S. (2008). IEMOCAP: Interactive emotional dyadic motion capture database. Language Resources and Evaluation, 42(4), 335–359. https://doi.org/10.1007/s10579-008-9076-6
  • Cooley, J. W., & Tukey, J. W. (1965). An algorithm for the machine calculation of complex Fourier series. Mathematics of Computation, 19(90), 297–301. https://doi.org/10.1090/mcom/1965-19-090
  • Cormode, G., Jha, S., Kulkarni, T., Li, N., Srivastava, D., & Wang, T. (2018). Privacy at scale: Local differential privacy in practice. In Proceedings of the 2018 International Conference on Management of Data (pp. 1655–1658). Association for Computing Machinery (ACM).
  • Deldjoo, Y., Schedl, M., Hidasi, B., Wei, Y., & He, X. (2022). Multimedia recommender systems: Algorithms and challenges. In Recommender systems handbook (pp. 973–1014). Springer.
  • Diaz, S. P., & Lutoborski, A. (2017). Discrete fourier transform tensors and their ranks. SIAM Journal on Matrix Analysis and Applications, 38(3), 1010–1027. https://doi.org/10.1137/16M1084717
  • Dwork, C. (2008). Differential privacy: A survey of results. In International Conference on Theory and Applications of Models of Computation (pp. 1–19). Springer.
  • Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., & Naor, M. (2006). Our data, ourselves: Privacy via distributed noise generation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 486–503). Springer.
  • Dwork, C., & Roth, A. (2014). The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3–4), 211–407.https://doi.org/10.1561/0400000042
  • Erlingsson, Ú., Pihur, V., & Korolova, A. (2014). Rappor: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 1054–1067). ACM.
  • Fan, L. (2018). Image pixelization with differential privacy. In IFIP Annual Conference on Data and Applications Security and Privacy (pp. 148–162). Springer.
  • Fan, L. (2019). Practical image obfuscation with provable privacy. In 2019 IEEE International Conference on Multimedia and Expo (ICME) (pp. 784–789). IEEE.
  • Fan, L. (n.d.). Image pixelization with differential privacy, 14.
  • Fernandes, N., Dras, M., & McIver, A. (2019). Generalised differential privacy for text document processing. In International Conference on Principles of Security and Trust (pp. 123–148). Springer.
  • Hall, R., Rinaldo, A., & Wasserman, L. (2013). Differential privacy for functions and functional data. The Journal of Machine Learning Research, 14(1), 703–727.https://doi.org/10.5555/2567709.2502603 
  • Han, Y., Li, S., Cao, Y., Ma, Q., & Yoshikawa, M. (2020). Voice-indistinguishability: Protecting voiceprint in privacy-preserving speech data release. In 2020 IEEE International Conference on Multimedia and Expo (ICME) (pp. 1–6). IEEE.
  • Hitchcock, F. L. (1928). Multiple invariants and generalized rank of a p-way matrix or tensor. Journal of Mathematics and Physics, 7(1-4), 39–79. https://doi.org/10.1002/sapm19287139
  • Liu, Z., Shen, Y., Lakshminarasimhan, V. B., Liang, P. P., Zadeh, A., & Morency, L. P. (2018). Efficient low-rank multimodal fusion with modality-specific factors. In Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Long Papers). Association for Computational Linguistics.
  • Lyu, L., Li, Y., He, X., & Xiao, T. (2020). Towards differentially private text representations. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 1813–1816). ACM.
  • Near, J. P., & Abuah, C. (2021). Programming differential privacy (Chapter 6). Jupyter Book.
  • Ngiam, J., Khosla, A., Kim, M., Nam, J., Lee, H., & Ng, A. Y. (2011). Multimodal deep learning. In Proceedings of the 28th International Conference on Machine Learning (ICML'11) (pp. 689–696). Omnipress.
  • Park, S., Shim, H. S., Chatterjee, M., Sagae, K., & Morency, L. P. (2014). Computational analysis of persuasiveness in social multimedia: A novel dataset and multimodal prediction approach. In Proceedings of the 16th International Conference on Multimodal Interaction (pp. 50–57). ACM.
  • Rastogi, V., & Nath, S. (2010). Differentially private aggregation of distributed time-series with transformation and encryption. In Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data (pp. 735–746). ACM.
  • Wang, T., Blocki, J., Li, N., & Jha, S. (2017). Locally differentially private protocols for frequency estimation. In 26th USENIX Security Symposium (USENIX security 17) (pp. 729–745). USENIX Association.
  • Xiong, X., Liu, S., Li, D., Cai, Z., & Niu, X. (2020). A comprehensive survey on local differential privacy. Security and Communication Networks 2020.
  • Yang, J., Xiang, L., Chen, R., Li, W., & Li, B. (2021). Differential privacy for tensor-valued queries. IEEE Transactions on Information Forensics and Security, 17, 152–164. https://doi.org/10.1109/TIFS.2021.3089884
  • Yue, X., Du, M., Wang, T., Li, Y., Sun, H., & Chow, S. S. (2021). Differential privacy for text analytics via natural text sanitization. In Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021 (pp. 3853–3866). Association for Computational Linguistics.
  • Zadeh, A., Chen, M., Poria, S., Cambria, E., & Morency, L. P. (2017). Tensor fusion network for multimodal sentiment analysis. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing (pp. 1103–1114). Association for Computational Linguistics.
  • Zadeh, A., Zellers, R., Pincus, E., & Morency, L. P. (2016). Multimodal sentiment intensity analysis in videos: Facial gestures and verbal messages. IEEE Intelligent Systems, 31(6), 82–88. https://doi.org/10.1109/MIS.2016.94