一种基于差分隐私的矩阵填充算法
A Matrix Completion Algorithm Based on Differential Privacy
摘要: 矩阵填充作为矩阵分析中的一个关键课题,对于处理不完整数据集至关重要,其应用广泛,覆盖图像处理、推荐系统等领域。与此同时,隐私保护在数据安全领域占据核心地位,旨在确保个人敏感信息在数据分析过程中得到充分的安全保障和保密处理。将这两个领域的研究结合,为应对实际应用中的复杂挑战提供了创新性的解决方案。文章提出了一种基于差分隐私的新型隐私保护矩阵填充方案。该方案巧妙地融合了差分隐私理论框架,通过向原始数据中添加噪声来保护用户隐私。这种做法确保了即使在数据公开或共享的情况下,个体的信息也不会被泄露,从而有效地防止了潜在的隐私风险。数值实验结果表明,所提出的方案不仅能够显著保护用户的隐私,同时还在保持数据效用方面表现出色。此外,该方法还提升了算法运行效率,降低了计算成本。
Abstract: Matrix completion, as a key topic in matrix analysis, is crucial for dealing with incomplete datasets, and its applications cover a wide range of fields, such as image processing and recommender systems. Meanwhile, privacy protection occupies a central position in the field of data security, aiming to ensure that personal sensitive information is adequately secured and confidentially handled during data analysis. Combining research in these two fields provides innovative solutions to address the complex challenges in practical applications. In this paper, we propose a novel privacy-preserving matrix completion scheme based on differential privacy. The scheme cleverly incorporates a differential privacy theoretical framework to protect user privacy by adding noise to the raw data. This approach ensures that individuals’ information is not disclosed even when the data is public or shared, thus effectively preventing potential privacy risks. Numerical experimental results show that the proposed scheme not only significantly protects user privacy, but also excels in maintaining data utility. In addition, the method improves the algorithm operation efficiency and reduces the computational cost.
文章引用:郭佳浩. 一种基于差分隐私的矩阵填充算法[J]. 应用数学进展, 2025, 14(2): 162-170. https://doi.org/10.12677/aam.2025.142061

参考文献

[1] Candès, E. and Recht, B. (2012) Exact Matrix Completion via Convex Optimization. Communications of the ACM, 55, 111-119. [Google Scholar] [CrossRef
[2] Ji, H., Liu, C., Shen, Z. and Xu, Y. (2010) Robust Video Denoising Using Low Rank Matrix Completion. 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Francisco, 13-18 June 2010, 1791-1798. [Google Scholar] [CrossRef
[3] Polania, L.F., Carrillo, R.E., Blanco-Velasco, M. and Barner, K.E. (2011) Matrix Completion Based ECG Compression. 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Boston, 30 August-3 September 2011, 1757-1760. [Google Scholar] [CrossRef] [PubMed]
[4] Gu, S., Zhang, L., Zuo, W. and Feng, X. (2014) Weighted Nuclear Norm Minimization with Application to Image Denoising. 2014 IEEE Conference on Computer Vision and Pattern Recognition, Columbus, 23-28 June 2014, 2862-2869. [Google Scholar] [CrossRef
[5] Lohr, S. (2010) Netflix Cancels Contest after Concerns Are Raised about Privacy. New York Times.
[6] Mironov, I. and McSherry, F. (2009) Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders. Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), Paris, 28 June-1 July 2009,627-636.
[7] Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I. and Naor, M. (2006) Our Data, Ourselves: Privacy via Distributed Noise Generation. In: Vaudenay, S., Ed., Advances in CryptologyEUROCRYPT 2006, Springer, 486-503. [Google Scholar] [CrossRef
[8] Wang, Z., So, H.C. and Liu, Z. (2022) Fast and Robust Rank-One Matrix Completion via Maximum Correntropy Criterion and Half-Quadratic Optimization. Signal Processing, 198, Article ID: 108580. [Google Scholar] [CrossRef
[9] Kang, Y.Y. (2016) Robust and Scalable Matrix Completion. 2016 International Conference on Big Data and Smart Computing (BigComp), Hong Kong, 18-20 January 2016, 46-52. [Google Scholar] [CrossRef
[10] Ma, R., Barzigar, N., Roozgard, A. and Cheng, S. (2014) Decomposition Approach for Low-Rank Matrix Completion and Its Applications. IEEE Transactions on Signal Processing, 62, 1671-1683. [Google Scholar] [CrossRef
[11] Tzagkarakis, C., Becker, S. and Mouchtaris, A. (2014) Joint Low-Rank Representation and Matrix Completion under a Singular Value Thresholding Framework. 2014 22nd European Signal Processing Conference (EUSIPCO), Lisbon, 1-5 September 2014, 1202-1206.
[12] Dorffer, C., Puigt, M., Delmaire, G. and Roussel, G. (2017) Fast Nonnegative Matrix Factorization and Completion Using Nesterov Iterations. In: Tichavský, P., Babaie-Zadeh, M., Michel, O. and Thirion-Moreau, N., Eds., Latent Variable Analysis and Signal Separation, Springer, 26-35. [Google Scholar] [CrossRef
[13] Cabral, R., De la Torre, F., Costeira, J.P. and Bernardino, A. (2013) Unifying Nuclear Norm and Bilinear Factorization Approaches for Low-Rank Matrix Decomposition. 2013 IEEE International Conference on Computer Vision, Sydney, 1-8 December 2013, 2488-2495. [Google Scholar] [CrossRef
[14] Candès, E.J. and Recht, B. (2009) Exact Matrix Completion via Convex Optimization. Foundations of Computational Mathematics, 9, 717-772. [Google Scholar] [CrossRef
[15] Nie, F., Wang, H., Huang, H. and Ding, C. (2013) Joint Schatten p-Norm and p-Norm Robust Matrix Completion for Missing Value Recovery. Knowledge and Information Systems, 42, 525-544. [Google Scholar] [CrossRef
[16] Liu, Y., Jiao, L.C. and Shang, F. (2013) A Fast Tri-Factorization Method for Low-Rank Matrix Recovery and Completion. Pattern Recognition, 46, 163-173. [Google Scholar] [CrossRef
[17] Halko, N., Martinsson, P.G. and Tropp, J.A. (2011) Finding Structure with Randomness: Probabilistic Algorithms for Constructing Approximate Matrix Decompositions. SIAM Review, 53, 217-288. [Google Scholar] [CrossRef