Abstract

There has been an exponential growth over the years in the number of users connected to social networks. This has spurred research interest in social networks to ensure the privacy of users. From a theoretical standpoint, a social network is modeled as a directed graph network and interactions among agents in the directed graph network can be analyzed with non-Bayesian learning and online learning strategies. The goal of the agents is to learn the underlying time-varying true state of the network through repeated cooperative interaction among themselves. To overcome privacy challenges in social networks, recent research works include differential privacy in the social network analysis to guarantee the privacy of shared information among the agents. However, the common online learning strategy adopted in most existing work is the stochastic multi-armed bandit approach which assumes that the loss distribution is independent and identically distributed. This does not account for the arbitrariness of the time-varying true state in the social network. Therefore, this paper proposes a tougher but realistic setting that removes the restriction on the loss distribution. Two non-stochastic multi-armed bandit algorithms are proposed. The first algorithm uses the Laplace mechanism to guarantee differential privacy against a third-party intruder. The second algorithm uses the Laplace mechanism to guarantee differential privacy against both a third-party intruder and any spying agent in the network. The simulation results show that the agents’ beliefs converge to the most dominant true state among the sequence of arbitrarily time-varying true states over the time horizon. The speed of convergence comes as a trade-off with privacy. Regret bounds are obtained for the proposed algorithms and compared to the non-private algorithm in the literature.

Highlights

  • The social network has played an important role in our daily lives by providing a platform for social interactions

  • Social network users often collaborate to learn the truth about an event over time, through social interactions within their social connections

  • This paper applies non-stochastic multi-armed bandit together with differential privacy to effectively track the time-varying true state in the social network modeled as a graph network

Read more

Summary

INTRODUCTION

The social network has played an important role in our daily lives by providing a platform for social interactions. There are some existing literature that studied how privacy can be guaranteed in social networks using differential privacy Most of these existing literature incorporate online learning strategies where all the agents receive full feedback over all possible actions [17]–[19]. Few works incorporate multiarmed bandit technique with differential privacy in social networks [20], [21] These few works used the stochastic multi-armed bandit where the true state follows a given distribution and the loss distribution is assumed to be independent and identically distributed. This paper applies non-stochastic multi-armed bandit together with differential privacy to effectively track the time-varying true state in the social network modeled as a graph network. The simulation results in this paper show that after a series of iterations using the proposed algorithms, the agents learn from the history of their past choices and make better decisions in tracking the timevarying true state with a privacy guarantee

RESEARCH CONTRIBUTIONS The contributions of this paper are as follows
RELATED WORKS
DIFFUSION LEARNING
M at time t
MULTI-ARMED BANDIT PROBLEM
DIFFERENTIAL PRIVACY
PROPOSED ALGORITHMS
9: Step 10
THEORETICAL RESULTS
2: Given that
VIII. CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.