Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
10 Machine Learning Blueprints You Should Know for Cybersecurity

You're reading from  10 Machine Learning Blueprints You Should Know for Cybersecurity

Product type Book
Published in May 2023
Publisher Packt
ISBN-13 9781804619476
Pages 330 pages
Edition 1st Edition
Languages
Author (1):
Rajvardhan Oak Rajvardhan Oak
Profile icon Rajvardhan Oak

Table of Contents (15) Chapters

Preface 1. Chapter 1: On Cybersecurity and Machine Learning 2. Chapter 2: Detecting Suspicious Activity 3. Chapter 3: Malware Detection Using Transformers and BERT 4. Chapter 4: Detecting Fake Reviews 5. Chapter 5: Detecting Deepfakes 6. Chapter 6: Detecting Machine-Generated Text 7. Chapter 7: Attributing Authorship and How to Evade It 8. Chapter 8: Detecting Fake News with Graph Neural Networks 9. Chapter 9: Attacking Models with Adversarial Machine Learning 10. Chapter 10: Protecting User Privacy with Differential Privacy 11. Chapter 11: Protecting User Privacy with Federated Machine Learning 12. Chapter 12: Breaking into the Sec-ML Industry 13. Index 14. Other Books You May Enjoy

Reviewing the privacy-utility trade-off in federated learning

In the previous section, we examined the effectiveness of federated learning and looked at the model performance over multiple communication rounds. However, to quantify the effectiveness, we need to compare this against two benchmarks:

  • A model trained on the entire data with no federation involved
  • A local model trained on its own data only

The differences in accuracy in these three cases (federated, global only, and local only) will indicate the trade-offs we are making and the gains we achieve. In the previous section, we looked at the accuracy we obtain via federated learning. To understand the utility-privacy trade-off, let us discuss two extreme cases – a fully global and a fully local model.

Global model (no privacy)

When we train a global model directly, we use all the data to train a single model. Thus, all parties involved would be publicly sharing their data with each other. The...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}