• About Us
  • Contact Us
  • Terms & Conditions
  • Privacy Policy
Technology Hive
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • More
    • Deep Learning
    • AI in Healthcare
    • AI Regulations & Policies
    • Business
    • Cloud Computing
    • Ethics & Society
No Result
View All Result
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • More
    • Deep Learning
    • AI in Healthcare
    • AI Regulations & Policies
    • Business
    • Cloud Computing
    • Ethics & Society
No Result
View All Result
Technology Hive
No Result
View All Result
Home Artificial Intelligence (AI)

New Method Safeguards Sensitive AI Training Data

Adam Smith – Tech Writer & Blogger by Adam Smith – Tech Writer & Blogger
April 11, 2025
in Artificial Intelligence (AI)
0
New Method Safeguards Sensitive AI Training Data
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

Introduction to Data Privacy

Data privacy comes with a cost. There are security techniques that protect sensitive user data, like customer addresses, from attackers who may attempt to extract them from AI models — but they often make those models less accurate.

A New Framework for Data Privacy

MIT researchers recently developed a framework, based on a new privacy metric called PAC Privacy, that could maintain the performance of an AI model while ensuring sensitive data, such as medical images or financial records, remain safe from attackers. Now, they’ve taken this work a step further by making their technique more computationally efficient, improving the tradeoff between accuracy and privacy, and creating a formal template that can be used to privatize virtually any algorithm without needing access to that algorithm’s inner workings.

How PAC Privacy Works

The team utilized their new version of PAC Privacy to privatize several classic algorithms for data analysis and machine-learning tasks. They also demonstrated that more “stable” algorithms are easier to privatize with their method. A stable algorithm’s predictions remain consistent even when its training data are slightly modified. Greater stability helps an algorithm make more accurate predictions on previously unseen data.

Benefits of PAC Privacy

The researchers say the increased efficiency of the new PAC Privacy framework, and the four-step template one can follow to implement it, would make the technique easier to deploy in real-world situations. “We tend to consider robustness and privacy as unrelated to, or perhaps even in conflict with, constructing a high-performance algorithm. First, we make a working algorithm, then we make it robust, and then private. We’ve shown that is not always the right framing. If you make your algorithm perform better in a variety of settings, you can essentially get privacy for free,” says Mayuri Sridhar, an MIT graduate student and lead author of a paper on this privacy framework.

Estimating Noise

To protect sensitive data that were used to train an AI model, engineers often add noise, or generic randomness, to the model so it becomes harder for an adversary to guess the original training data. This noise reduces a model’s accuracy, so the less noise one can add, the better. PAC Privacy automatically estimates the smallest amount of noise one needs to add to an algorithm to achieve a desired level of privacy.

Improvements to PAC Privacy

The original PAC Privacy algorithm runs a user’s AI model many times on different samples of a dataset. It measures the variance as well as correlations among these many outputs and uses this information to estimate how much noise needs to be added to protect the data. This new variant of PAC Privacy works the same way but does not need to represent the entire matrix of data correlations across the outputs; it just needs the output variances. “Because the thing you are estimating is much, much smaller than the entire covariance matrix, you can do it much, much faster,” Sridhar explains.

Privacy and Stability

As she studied PAC Privacy, Sridhar hypothesized that more stable algorithms would be easier to privatize with this technique. She used the more efficient variant of PAC Privacy to test this theory on several classical algorithms. Algorithms that are more stable have less variance in their outputs when their training data change slightly. PAC Privacy breaks a dataset into chunks, runs the algorithm on each chunk of data, and measures the variance among outputs. The greater the variance, the more noise must be added to privatize the algorithm.

Conclusion

The team showed that these privacy guarantees remained strong despite the algorithm they tested, and that the new variant of PAC Privacy required an order of magnitude fewer trials to estimate the noise. They also tested the method in attack simulations, demonstrating that its privacy guarantees could withstand state-of-the-art attacks. The researchers want to explore how algorithms could be co-designed with PAC Privacy, so the algorithm is more stable, secure, and robust from the beginning.

FAQs

  • Q: What is PAC Privacy?
    A: PAC Privacy is a new privacy metric that can maintain the performance of an AI model while ensuring sensitive data remain safe from attackers.
  • Q: How does PAC Privacy work?
    A: PAC Privacy adds noise to an AI model to protect sensitive data, and it automatically estimates the smallest amount of noise needed to achieve a desired level of privacy.
  • Q: What are the benefits of PAC Privacy?
    A: The benefits of PAC Privacy include improved tradeoff between accuracy and privacy, and a formal template that can be used to privatize virtually any algorithm without needing access to that algorithm’s inner workings.
  • Q: Is PAC Privacy efficient?
    A: Yes, the new variant of PAC Privacy is more computationally efficient and requires an order of magnitude fewer trials to estimate the noise.
  • Q: Can PAC Privacy be used in real-world situations?
    A: Yes, the increased efficiency of the new PAC Privacy framework and the four-step template make the technique easier to deploy in real-world situations.
Previous Post

AI Models Conceal Their True Reasoning Processes

Next Post

Deutsche Telekom Extends Partnership With Google Cloud Until 2030

Adam Smith – Tech Writer & Blogger

Adam Smith – Tech Writer & Blogger

Adam Smith is a passionate technology writer with a keen interest in emerging trends, gadgets, and software innovations. With over five years of experience in tech journalism, he has contributed insightful articles to leading tech blogs and online publications. His expertise covers a wide range of topics, including artificial intelligence, cybersecurity, mobile technology, and the latest advancements in consumer electronics. Adam excels in breaking down complex technical concepts into engaging and easy-to-understand content for a diverse audience. Beyond writing, he enjoys testing new gadgets, reviewing software, and staying up to date with the ever-evolving tech industry. His goal is to inform and inspire readers with in-depth analysis and practical insights into the digital world.

Related Posts

AI Video Generation Techniques
Artificial Intelligence (AI)

AI Video Generation Techniques

by Adam Smith – Tech Writer & Blogger
September 12, 2025
VMware starts down the AI route, but it’s not core business
Artificial Intelligence (AI)

VMware starts down the AI route, but it’s not core business

by Adam Smith – Tech Writer & Blogger
September 11, 2025
Collaborating with Generative AI in Finance
Artificial Intelligence (AI)

Collaborating with Generative AI in Finance

by Adam Smith – Tech Writer & Blogger
September 11, 2025
DoE selects MIT to establish a Center for the Exascale Simulation of Coupled High-Enthalpy Fluid–Solid Interactions
Artificial Intelligence (AI)

DoE selects MIT to establish a Center for the Exascale Simulation of Coupled High-Enthalpy Fluid–Solid Interactions

by Adam Smith – Tech Writer & Blogger
September 10, 2025
Therapist Caught Using ChatGPT
Artificial Intelligence (AI)

Therapist Caught Using ChatGPT

by Adam Smith – Tech Writer & Blogger
September 9, 2025
Next Post
Deutsche Telekom Extends Partnership With Google Cloud Until 2030

Deutsche Telekom Extends Partnership With Google Cloud Until 2030

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Articles

UK wants to prove AI can modernise public services responsibly

UK wants to prove AI can modernise public services responsibly

March 3, 2025
The Overhyped Success of Google Gemini’s Pokémon

The Overhyped Success of Google Gemini’s Pokémon

May 5, 2025
Making Machine Learning Decisions Understandable

Making Machine Learning Decisions Understandable

May 1, 2025

Browse by Category

  • AI in Healthcare
  • AI Regulations & Policies
  • Artificial Intelligence (AI)
  • Business
  • Cloud Computing
  • Cyber Security
  • Deep Learning
  • Ethics & Society
  • Machine Learning
  • Technology
Technology Hive

Welcome to Technology Hive, your go-to source for the latest insights, trends, and innovations in technology and artificial intelligence. We are a dynamic digital magazine dedicated to exploring the ever-evolving landscape of AI, emerging technologies, and their impact on industries and everyday life.

Categories

  • AI in Healthcare
  • AI Regulations & Policies
  • Artificial Intelligence (AI)
  • Business
  • Cloud Computing
  • Cyber Security
  • Deep Learning
  • Ethics & Society
  • Machine Learning
  • Technology

Recent Posts

  • Create a Voice Agent in a Weekend with Realtime API, MCP, and SIP
  • AI Revolution in Law
  • Discovering Top Frontier LLMs Through Benchmarking — Arc AGI 3
  • Pulling Real-Time Website Data into Google Sheets
  • AI-Powered Agents with LangChain

Our Newsletter

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

© Copyright 2025. All Right Reserved By Technology Hive.

No Result
View All Result
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • AI in Healthcare
  • AI Regulations & Policies
  • Business
  • Cloud Computing
  • Ethics & Society
  • Deep Learning

© Copyright 2025. All Right Reserved By Technology Hive.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?