Better Locally Private Sparse Estimation Given Multiple Samples Per User
Abstract
Previous studies yielded discouraging results for item-level locally differentially private linear regression with -sparsity assumption, where the minimax rate for samples is . This can be challenging for high-dimensional data, where the dimension is extremely large. In this work, we investigate user-level locally differentially private sparse linear regression. We show that with users each contributing samples, the linear dependency of dimension can be eliminated, yielding an error upper bound of . We propose a framework that first selects candidate variables and then conducts estimation in the narrowed low-dimensional space, which is extendable to general sparse estimation problems with tight error bounds. Experiments on both synthetic and real datasets demonstrate the superiority of the proposed methods. Both the theoretical and empirical results suggest that, with the same number of samples, locally private sparse estimation is better conducted when multiple samples per user are available.
1 Introduction
Local differential privacy (LDP) (Kairouz et al., 2014; Duchi et al., 2018), a variant of differential privacy (DP) (Dwork et al., 2006), has gained considerable attention in recent years. LDP assumes that each sample is possessed by a data holder, who privatizes their data before it is collected by the curator. Offering a stronger sense of privacy protection compared to central DP, learning under LDP often encounters challenges such as slow convergence, high demand for local machine capacity, and limited accessibility to basic techniques (Duchi et al., 2018; Tramèr et al., 2022; Ma et al., 2024b), which obstruct the theoretical analysis and practical implementation of LDP learning.
Fortunately, in some scenarios, each user may possess multiple samples, which can serve as a way to overcome these difficulties. This is known as user-level LDP (ULDP) (Acharya et al., 2023; Bassily & Sun, 2023). Research has demonstrated performance improvement in intentionally designed models when each user has multiple samples, from both the central DP perspective (Liu et al., 2020; Ghazi et al., 2021; Levy et al., 2021; Narayanan et al., 2022; Ghazi et al., 2023) and the LDP perspective (Girgis et al., 2022; Acharya et al., 2023; Bassily & Sun, 2023). In most cases (for ULDP), the improvement lies in the effective sample size: if there are users with samples and privacy budget , the problem is as tractable as having users with one sample and privacy budget . See Table 1 for a summary.
We proceed to ask the following question: Besides effective sample size, does having multiple samples per user offer benefits? If the answer to this question is affirmative, it holds practical significance. For instance, when designing data collection schemes, the primary focus should be on users capable and willing to provide multiple samples. Moreover, if a significant number of users lack trust in the data collector but are willing to share information within small groups (such as family or company), then better mechanisms can be devised for conducting the learning process.
In this work, we offer an affirmative response to the question from the perspective of sparse estimation. Sparse estimation stands as a crucial task in modern machine learning, especially when dealing with high-dimensional data where structured assumptions like sparsity can significantly enhance performance. Particularly, we study sparse linear regression. We first elucidate why the minimax lower bound fails to hold when each user possesses multiple samples and provide a lower bound for ULDP (Theorem 2.4). Subsequently, we introduce an algorithm structured as follows: half of the users perform local variable selection and aggregate their findings to identify the support of non-zero variables. Under mild assumptions, we establish theoretical guarantees for both local selection (Proposition 3.2) and aggregation (Proposition 3.3). Then, to conduct estimation on the narrowed space, we propose a sub-optimal multi-round protocol (Theorem 3.4) and a two-round protocol (Theorem 3.6). The latter achieves an estimation error . Compared to minimax error rate under LDP, our rate improves by a factor of which can be significant for high dimensional data. Furthermore, we demonstrate how the latter protocol straightforwardly extendeds to other sparse estimation problems (Theorem 3.7).
We summarize our contributions as follows.
-
•
We formalize, for the first time, the advantage of ULDP over LDP by considering the sparse assumption. Our findings reveal that the rates of sparse problems, such as sparse linear regression and sparse mean estimation, do not scale linearly in under ULDP, which contrasts with previous negative results for LDP.
-
•
We provide a general framework for ULDP sparse estimation. Moreover, focusing on linear regression, we devise tailored methods that achieve tight upper bounds. The precise estimation procedures serve as solutions to low-dimensional ULDP linear regression, which are of independent interest.
-
•
We conduct experiments on both synthetic and real datasets, with convincing results demonstrating the superiority of our methods.
The article is structured as follows: In Section 2, we discuss related literature, preliminary knowledge, and minimax results of ULDP sparse linear regression. In Section 3, we present our solutions. In Section 4, we provide experiment results. All technical proofs, detailed algorithms, and additional experiment results are included in the appendix.
2 ULDP Sparse Linear Regression
2.1 Preliminaries
We introduce necessary notations. For any vector , let denote the -th element of . Let be a slicing vector of , whose -th elements is . Let be the norm of for . We will evaluate the estimation error by the squared loss, i.e. . For matrix , let denote the -th largest singular value of . Throughout this paper, we use the notation and to denote that there exist positive constant and such that and , for all . We use if . We denote if and . Let and . Besides, for any set , the diameter of is defined by .
Suppose we have users. The -th user has i.i.d. samples from distribution on domain . We consider the classical sparse linear regression. Let each be i.i.d. sub-Gaussian. Moreover, denote the covariance matrix of the marginal distribution. Assume for some constant . For mean zero sub-Gaussian random variable , conditional distribution and its coefficients are described by
(1) | ||||
which has -sparsity and non-zero entries bounded away from 0. Without loss of generality, we assume the first elements of are non-zero.
We adopt the following setting for privacy constraints. Any estimation of is considered as a random variable, while its construction process with respect to the data is user-level locally differentially private (ULDP). We consider the sequential interactive case where the private observation is decided only by its local samples and previous observations . The rigorous definition of (pure) ULDP is as follows.
Definition 2.1 (User-level local differential privacy).
Given data , each is mapped to privatized information which is a random variable on . Let be the -field on . is drawn conditional on via the distribution . Then the mechanism provides -user-level local differential privacy (-ULDP) if
for all , , , and .
ULDP reduces to the conventional item-level LDP for . Besides being more practically reasonable (Cummings et al., 2022), ULDP is also a more stringent definition than item-level LDP. To achieve -ULDP by trivially using group privacy, each item must use a significantly smaller budget . Conversely, on the curator side, inference of any single item is no easier than inference of the whole user, which means each item is as safe as -LDP against the curator. As a compromise, each item should expose information to its group mates. The requirement is typically acceptable, such as when each user has multiple records on a personal cellphone, or when data sources can be clustered into small groups where secrete information is safely shared.
2.2 Related Work
Extensive studies have been conducted focusing on the central DP setting for linear regression model in low dimensions (Wang, 2018; Avella-Medina et al., 2023; Alabi et al., 2022; Arora et al., 2022; Amin et al., 2023) and high dimensions (Kifer et al., 2012; Talwar et al., 2015; Kumar & Deisenroth, 2019; Zhang & Zhang, 2021; Cai et al., 2021; Hu et al., 2022; Khanna et al., 2023a, b; Raff et al., 2023). Despite variations in settings and assumptions, state-of-the-art results (Liu et al., 2022; Varshney et al., 2022; Cai et al., 2023) indicate a general error rate of for squared loss, where the dependency on the dimension of feature space is . Thus, can be exponentially large in to ensure consistent estimation.
This is not the case in local setting, of which there is still a lack of understanding compared to the central one. Several works addressed the problem focusing on the optimization error (Smith et al., 2017; Zheng et al., 2017). Both works assumed and do not generalize to many practical settings, such as when all features are i.i.d. and therefore . As for statistical estimation, Duchi et al. (2018) showed the matching upper and lower bounds for low dimensional, non-interactive linear regression are . Wang & Xu (2019) first provided the lower bound for LDP linear regression with 1-sparsity, which is then generalized to -sparsity by Zhu et al. (2023). In summary, these prohibitive results indicate that there exists no meaningful approach when , which is often the case in practice.
Our approach utilize a selection-estimation strategy, which is shown to be advantages under many situation. Under non-private setting, Wang et al. (2011); Liang et al. (2023) select candidate variables by aggregating Lasso fitted on random subsamples, which is also adopted with privacy (Kifer et al., 2012). More recently, the strategy has been used for communication-constrained learning (Duchi & Rogers, 2019; Barik & Honorio, 2020; Acharya et al., 2021). Note that our method is also communication efficient, as each user sends only bit of information. Acharya et al. (2021) tackled LDP sparse discrete distribution estimation by selecting the support variables. However, this is only feasible for such specific problems where users can provide useful information about which variables are potentially non-zero given only one sample. Their result does not generalize to other problems.
During the preparation of the camera-ready version of this paper, Kent et al. (2024) appeared online and analyzed sparse mean estimation under ULDP. We share some results with their conclusions, including the negative results for , the established rates, and a support estimation type estimator. However, we primarily consider the case where , whereas their analysis is more comprehensive, considering other regions and, more importantly, identifying the phase transition.
2.3 Minimax Lower Bound
We introduce the related minimax results of locally private sparse linear regression. For any loss function (squared loss in our case), the minimax convergence rate is
where is the hypothesis distribution class and is any estimator of . The minimax lower bound for sparse linear regression under LDP is well explored in Wang & Xu (2019) and Zhu et al. (2023).
Proposition 2.2 (LDP lower bound).
The above result yields that for , any attempt to LDP sparse linear regression is effortless, as the estimation error does not even converge. In fact, similar negative result also holds when is small yet larger than 1.
Proposition 2.3 (Necessity of sufficiently large ).
Proposition 2.3 shows that for , the error does dot converge to zero as grows. However, this is not the case for user-level LDP if is sufficiently large. The rigorous counterargument is by establishing upper bound in Theorem 3.6, which is . We explain why the bound fails to generalize. Its proof involves construction of a function class and a distribution of , such that the mutual information between and private views is bounded from above and below. The former does not hold any more given samples, since the mutual information becomes larger exponentially in . By carefully bounding the quantity, we establish the following lower bound for ULDP.
Theorem 2.4 (ULDP lower bound).
The result shows that any ULDP estimator admits an error scaling at least with . Thus, a possible improvement for ULDP over LDP lies in replacing with .
3 An Algorithm
We begin by outlining our approach to solving the ULDP sparse linear regression problem. A key observation is that with samples, each user can obtain a rough estimation of parameter with its local samples. The central challenge then lies in how to aggregate these rough estimations privately. As depicted in Figure 1, our proposed solution operates in two stages. In the initial stage, users within the first group independently identify the non-zero elements of from their local data and transmit privatized information accordingly. By aggregating this information, we determine the most frequent elements, which serve as the candidate variables for our estimation process. On the narrowed parameter space, we estimate the parameter using remaining users. Subsequently, we present the candidate variable selection, final estimation, and extension to general sparse estimations in Section 3.1, 3.2, and 3.3, respectively.
3.1 Candidate Variable Selection
In this section, we elucidate the steps for candidate variable selection. First, each user prepares a piece of information , indicating the variable is selected by user and probably belong to the true variable set. Then, a curator privately aggregates the information s and outputs the candidate variables.
To formalize , each user adopt a local selector . For each , can be any plug-in method and is chosen differently based on the constraints of sample size, computational power, and prior information, as long as it produces a good selection results described as follows.
Definition 3.1 (-Good selector).
Consider user and its i.i.d. samples from . For , an -good selector is an algorithm such that for all , there holds
(2) |
Here, the probability is taken w.r.t. randomness of both and .
(2) requires a lower bound on probability for the true variables to be selected. To induce such selectors, we consider first conducting a local variable selection using and uniformly sampling a . The following proposition demonstrates that obtaining such a selector is feasible given mild assumptions on distribution , leveraging well-developed variable selection methods.
Proposition 3.2 (Existence of good selectors).
Under model (1), if either of the following conditions holds, there exists a -good selector with a constant : (i) , , and ; (ii) .
See Appendix B.1 for examples of precise algorithms and detailed proofs. (i) and (ii) are examples of sufficient conditions that are relatively easy to satisfy. They require mild correlations among covariates, a strong signal (minimum absolute value of ), and an adequate number of local samples. Similar conditions are standard in high-dimensional statistics (Fan & Li, 2001; Zhao & Yu, 2006). Though the lower bound of is considerable and will leads to a improved minimax rate in the non-private case (Ndaoud, 2019), it is not the key for ULDP sparse linear regression to be advantages over its LDP counterpart. This is because the function classes constructed in Wang & Xu (2019); Zhu et al. (2023) for lower bound proof are all covered by the assumptions. Additionally, the sample size requirement remains polynomial in and , which is theoretically reasonable.
Given the local information , we conduct a private voting to identify the frequently appeared variables . Suppose we use the first users for identification, although the proportion is arbitrary and can be any constant. Considering the large size of the variable universe compared to number of available users, this task is closely related to the problem of heavy hitter detection (Bassily et al., 2020; Acharya et al., 2021). We solve the identification problem in standard manner (Bassily et al., 2020), while any tailored approach is adoptable. Specifically, we encode the variables into a binary string using bits. Next, we traverse a binary prefix tree from level to and eliminate nodes that cannot serve as prefixes of heavy hitters, namely those with frequencies lower than a certain threshold . The key advantage of this method is its ability to identify frequent elements with frequencies above , which overcomes the polynomial dependency on in LDP discrete density estimation (Kairouz et al., 2016; Duchi et al., 2018). The detailed procedure (HeavyHitter) is provided in Appendix B.2.
In the first part of Algorithm 1, we summarize the pipline for candidate variable selection. The following proposition demonstrates its effectiveness by establishing that, provided the existence of local good selectors, the curator can select a set of variables of size containing the true variables. This property, known as perfect selection or consistent selection (Zhao & Yu, 2006; Belloni & Chernozhukov, 2013), plays a crucial role in the theoretical properties of subsequent operations.
Proposition 3.3.
Let be the selected variables in Algorithm 1. Suppose that all are -good selectors with . If we take , then with probability , we have (i) , (ii) .
Note that our scheme samples only one locally selected variable and disregards the others. This select-one-and-aggregate approach has been demonstrated to be as effective as if each user had only one variable (Zhu et al., 2020; Cohen et al., 2023). To fully utilize the information of the selected variables, we can leverage the set-value heavy hitters (Qin et al., 2016; Zhu et al., 2020; Wang et al., 2023). However, this only results in an improvement of in the threshold, which is not our primary focus.
3.2 Coefficient Estimation
Given the selected variables , the problem is reduced to low dimensional linear regression. Efficient algorithms and fundamental limits have been established (Duchi et al., 2018; Wang & Xu, 2019) for item-level LDP. Leveraging these algorithms, one can ignore all but one sample from each user and obtain an error bound depending polynomially on instead of . However, we would like to explore the benefits brought by having multiple samples per user, as is addressed in the advanced research of ULDP.
We introduce necessary notations to define the learning problem on the selected subspace. Given Proposition 3.3, we assume the selected variables contain the true ones in the following analysis. Without loss of generality, let . We put a hat over the quantities on the selected space. Let be the marginal distribution on the selected space , where . Define the data on selected space as and . The underlying coefficients becomes .
3.2.1 A Multi-round Protocol via SCO
At first glance, we can directly find through the following ULDP stochastic convex optimization problem on the selected space
(3) |
Recent study (Bassily & Sun, 2023) provided methodology and established theory with respect to smooth loss functions. We borrow their algorithm, presented in Appendix C.1, which is a private variant of accelerated mini-batch gradient descent. It utilize the fact that the gradient of a local batch concentrates with rate to reduce the magnitude of noise added to the gradients. While the methodology remains the same, we improve the theoretical analysis in Bassily & Sun (2023) to accommodate squared loss, which possesses strong convexity and leads to faster convergence.
Theorem 3.4 (Informal).
The result stated in Theorem 3.4 holds in expectation, unlike the other conclusions which hold with high probability. This distinction arises from the formulation of the technical lemma we borrowed. Upon initial inspection, we notice that both parts of the theorem involve , indicating a degradation associating to variable selection performance. However, according to Proposition 3.2, is merely a constant given a sufficiently large . The higher-order term of encompasses various overheads, including the private mean estimation error and the Lipschitz constant of the squared loss over the ball.
3.2.2 A Two Round Protocol
The multi-round protocol is disadvantageous from two perspectives. Firstly, as a gradient-based method, it necessitates rounds of communication, which can be prohibitively slow in practice due to network latency (Smith et al., 2017; Zheng et al., 2017). Secondly, compared to Theorem 2.4, the upper bound provided in Theorem 3.4 is far from tight concerning . We question whether these drawbacks can be mitigated for the specific problem of linear regression. In this section, we provide an affirmative answer. Our main inspiration stems from the following observation.
Proposition 3.5.
There exists estimators on selected variables , such that for all , we have and with probability . Moreover, if either condition in Proposition 3.2 holds, the bound improves to .
Since the mean of is , an ideal estimator would be the mean of s. Moreover, Proposition 3.5 indicates that concentrates as increases, suggesting that we can confine to a restricted area to enhance estimation accuracy. We propose a two-stage estimation similar to Girgis et al. (2022). First, leveraging user indices , we designate a histogram bin on , wherein almost all the values will fall. Then, the last group of users project their onto the bin and add a Laplace noise. Given the reduced sensitivity of the projected coefficients, the noise magnitude significantly diminishes. We provide detailed methodology (ULDPMean) in Appendix C and summarize the pipline in Algorithm 1.
The entire protocol requires a reasonable rounds of communication, with each user sending 1 bit of information. The communication rounds are necessary for HeavyHitter, which can be substituted by any other customized identification method for improved efficiency. In the coefficient estimation stage, our method takes two round communication, which is quite efficient. Fully utilizing multiple samples necessitates sequential interactivity (Acharya et al., 2023; Bassily & Sun, 2023).
We now present the main result, which is the error upper bound of the estimator summarized in Algorithm 1.
Theorem 3.6.
The upper bound in (4) consists of two parts. Both terms include additional s and s, which are inevitable due to selection degradation and the overhead of utilizing multiple local samples. The s are due to the union bound arguments, while is merely constants by Proposition 3.2. Ignoring and , the first part recovers the rate of non-private linear regression on dimensional space. The second part corresponds to privacy. When , this part is negligible. Algorithm 1 achieves the same error as if its non-private. It worth noting that in most cases (see e.g. Table 1), locally private algorithm matches its non-private counterpart when . The improvement of (5) over (4) is based on the existence of sparse oracles that achieve error locally, instead of .
We observe that, unlike common high-dimensional results (Wang & Xu, 2019; Cai et al., 2023), our bound does not involve a term. This phenomenon is also noted in Ndaoud (2019), where the disappears if we leverage the beta-min condition in Proposition 3.2. We will observe in the experiments that if is large enough, our method is more robust to changes in . However, this is not to say that we can deal with arbitrarily large . The logarithmical relationship is still contained in , which poses a requirement of as in Proposition 3.2. Moreover, omitting the log factors, the privacy error is decided by the total number of samples for sufficiently large and . Thus, we can achieve the same estimation error with less number of users if there are more local samples per user, while retaining the same level of privacy for each user since is fixed. On contrary, if there is users with one sample each, the error is inevitably (Proposition 2.2). This comparison illustrates the advantage of having both sufficient users and local samples compared to having abundant users and only one local sample. Note that this distinction holds only between sequential-interactive ULDP and LDP. It is unclear whether the lower bound holds under non-interactive ULDP, since most ULDP methods require sequential interactivity (Acharya et al., 2023; Bassily & Sun, 2023).
3.3 Extension to Sparse Estimation
In this section, we show our framework can be applied to various sparse problems through reduction to non-private learners. We consider estimation of from data , which is generated from distribution parameterized by . is assumed to be in . The assumptions include linear regression as a special case. It’s important to note that Algorithm 1 depends on the particular problem form via two steps: (i) the selector and (ii) the estimator . Both components depend on a non-private estimator of . The following theorem demonstrates that, given a qualified estimator, our framework achieves fast convergence rates for the general problem of sparse estimation.
Theorem 3.7 (Informal).
Let data be generated by for . Suppose we have non-private estimators: (i) estimator with for all and (ii) estimator on selected variables with and for all . Then, for any , there exists an -ULDP algorithm whose output has
(6) |
with probability at least . Moreover, for norm, there holds
(7) |
with probability at least .
We also present a result for the norm. Comparing (7) to (6), the difference arises from the discrepancy between the and norms, given that we only have non-zero elements in our sparse estimation problem. We discuss the implications of Theorem 3.7. Consider the sparse mean estimation (Duchi et al., 2018; Zhou et al., 2022), where non-private estimator achieves (Johnstone, 1994) under mild conditions. Then the bound (6) becomes identical to (5), which eliminates the linear dependency of in LDP (Duchi et al., 2018). For sparse discrete distribution estimation, Acharya et al. (2021) removed the linear dependency of . With , our bound (7) is larger than theirs in sense.
It worth mentioning that when is small, our upper bound matches the lower bound for . In this scenario, selector provides no useful information and is equivalent to a random selection, i.e. . If , then (5) becomes
Up to logarithmic factors, the second term matches the lower bound established in Zhu et al. (2023) for sparse linear regression and Duchi et al. (2018) for sparse mean estimation.
4 Experiment Results
We conduct experiments on both synthetic and real datasets to show the superiority of proposed methods and to validate our theoretical findings. The tested methods include: (i) 2-SLR: The proposed two-round ULDP sparse linear regression method outlined in Algorithm 1; (ii) M-SLR: The proposed multi-round version in Algorithm 6. The competing methods are: (iii) LDPPROX: The non-interactive LDP proxy estimator in Zhu et al. (2023); (iv) LDPIHT: The LDP iterative hard thresholding in Wang & Xu (2019); Zhu et al. (2023). Both comparison methods receive samples with budget each. Additionally, we report performance of non-privately fitting (v) Lasso using samples, representing an alternative for each user to rely solely on their local information. Implementation details are provided in Appendix E. For each model, we report the best result over its parameter grids, with the best result determined based on the average of at least 30 replications. The size of the parameter grids is selected based on running time to ensure that each method incurs an equal amount of computation. All experiments are conducted on a machine with 72-core Intel Xeon 2.60GHz and 128GB of main memory. The code is publicly available at GitHub444https://github.com/Karlmyh/ULDP-SL.
4.1 Simulation
We conducted experiments on synthetic data to validate the theoretical findings. Two sets of parallel experiments are conducted for independent and correlated marginal distributions, respectively, while results of the latter are presented in Appendix E. We draw each and independently from standard Gaussian distribution. For , we randomly select coordinates to be and let others be zero. Typically, we set , , , and , while varying one of them to observe how the evaluated metric varies. We use squared error to evaluate the estimated coefficients and F1 score to evaluate variable selection.
We conduct experiments w.r.t. . We first analyze the variable selection performance. For , we compute the averaged F1 scores of the proposed candidate variable selection (represented by 2-SLR) and other methods. As shown in Figure 2(a), the selection performance of 2-SLR is superior to variables induced by other methods. Particularly noteworthy is that 2-SLR achieved higher F1 scores than Lasso. This observation aligns with Wang et al. (2011); Liang et al. (2023), where aggregating Lasso fitted on random subsamples leads to performance gains in both selection and prediction.
Next, we analyze the estimation performance with respect to . In Figures 2(b) and 2(c), we plot the curve of error w.r.t. . Given a large , the proposed methods are less sensitive to compared to LDPIHT and Lasso. This observation is compatible with the rate in (5), which is independent of . Conversely, for smaller , the local selectors can not provide a constant for exponentially larger . As a result, the trend of our methods is steeper.
We examine the privacy-utility trade-offs by investigating performances under different . In Figure 2(d), the error decreases as increases for all private methods. Moreover, the error of 2-SLR is consistently better than Lasso, while error of M-SLR quickly drops below Lasso at medium privacy levels (). This shows the superiority of our methods compared to fitting Lasso using only local information.
Finally, we analyze the impact of sample sizes. We conducted experiments with varying (ranging from 50 to 200) under different , comparing the performance of our methods with Lasso on local samples. The results for varying are presented in Figure 3. We observe that given a sufficiently large , 2-SLR always outperforms Lasso, and M-SLR performs comparably even for . If , only M-SLR with performs worse than Lasso. However, given an insufficient , Lasso performs comparably to 2-SLR with . Similarly, in Figures 4(a) and 4(b), the error decreases as increases for all . The results indicate that our methods outperform Lasso under various settings, except for M-SLR with . This observation is reasonable and aligns with phenomena commonly observed in ULDP learning, federated learning, or transfer learning, where incorporating information from other data sources may not necessarily improve estimation if the quality of that additional information is low due to factors such as privacy constraints, data heterogeneity, or data compression.
Moreover, we set and varied the ratio . In Figure 4(c), we observe that, for each , the error of 2-SLR remains stable when , while it slightly increases when either or is too small, which is consistent with Theorem 3.6. Furthermore, the performance of M-SLR is more sensitive to becoming small. This is attributed to its gradient nature, which requires a large number of users.
4.2 Real Data
Budget | Datasets | NP-2-SLR | NP-M-SLR | Lasso | 2-SLR | M-SLR | LDPPROX | LDPIHT |
Airline | 1.01 | 0.82 | 1.02 | 1.02 | 0.98* | 1.38 | 1.85 | |
Loan | 0.97 | 0.88 | 0.99 | 0.98 | 0.97 | 5.27 | 2.00 | |
MIP | 1.00 | 0.96 | 1.65 | 1.00 | 0.98* | 2.54 | 1.87 | |
Taxi | 0.95 | 0.01 | 1.04 | 0.96 | 0.01* | 1.20 | 1.02 | |
Wine | 1.19 | 1.17 | 1.14* | 1.34 | 1.37 | 7.71 | 2.30 | |
Yolanda | 1.10 | 1.14 | 1.19 | 1.19 | 1.22 | 1.90 | 2.36 | |
Airline | 1.01 | 0.82 | 1.02 | 1.02 | 0.88* | 1.15 | 1.02 | |
Loan | 0.97 | 0.88 | 0.99 | 0.98 | 0.90* | 2.05 | 1.65 | |
MIP | 1.00 | 0.96 | 1.65 | 1.01 | 0.96* | 3.30 | 1.82 | |
Taxi | 0.95 | 0.01 | 1.04 | 0.95 | 0.01* | 1.16 | 1.88 | |
Wine | 1.19 | 1.17 | 1.14* | 1.19 | 1.27 | 5.39 | 1.74 | |
Yolanda | 1.10 | 1.14 | 1.19 | 1.11* | 1.18 | 1.79 | 2.03 | |
Rank sum | - | 31 | 24 | 19 | 56 | 50 |
We conduct experiments on six real datasets with various sample sizes and dimensionalities. Among the datasets, Airline and Taxi are the most suitable for our setting, where each user possesses small local samples with large dimensions. The datasets contain sensitive information and have been used in privacy research (Ma et al., 2024b). The other datasets are manually grouped to fit our framework. See Appendix E.3 for description of datasets.
We first compute the mean squared error over 30 random train-test splits for and . To standardize the scale across datasets, we report the MSE ratio relative to non-private fitting with Lasso over all samples. The results are displayed in Table 2. For both high privacy () and medium privacy (), the proposed methods significantly outperform competitors in terms of both average performance (rank sum) and the number of best results achieved. It is worth noting that in most cases, Lasso fitted on local datasets outperforms LDP competitors, yielding the effortlessness of LDP sparse regression. Moreover, the running time of the methods is displayed in Appendix E.3. The results show that, if properly paralleled, our methods are quite efficient.
We observe that our methods (2-SLR and M-SLR) can sometimes outperform non-private Lasso on the whole data. This is somewhat expected. As explained in previous literature (Ndaoud, 2019), given strong signal strength ( is large), the optimal error can actually be improved and simply performing Lasso does not achieve this optimality. Moreover, methodological works (Wang et al., 2011; Liang et al., 2023) showed the effectiveness of selecting candidate variables by aggregating Lasso fitted on random subsamples. Intuitively, even with strong signal strength, fitting Lasso does not guarantee the selection of all true variables due to randomness, while aggregating variables selected on random subsamples is more likely to identify true variables. We validated our conjecture by running non-private SLRs (). The results are presented in Table 2. We observe that 2-SLR and M-SLR never outperform their non-private counterparts, while non-private SLRs occasionally outperform Lasso on some datasets.
We also observe that 2-SLR outperforms M-SLR in simulation, while the opposite is true in real data. The phenomenon is attributed to the implicit regularization. In synthetic data, where the data is neatly generated, estimations tend to converge well. However, real data often contains more noise, leading to potentially unstable estimations. In such cases, using zero coefficients as the initial point yields a regularized estimator (Ali et al., 2019), which are biased yet stable.
5 Discussion
In this work, we investigate the ULDP sparse linear regression. By proposing a two-phase solution, we show the theoretical advantage of having multiple samples per user, which is then validated by exhaustive experiments.
It is worth mentioning that we do not explore scenarios where is small, such as . Our experiments, particularly with the MIP dataset, demonstrate that even with few local samples, satisfactory results can be achieved. However, dealing with small may require a comprehensive distributional analysis of variable selection, which could be a promising avenue for future research. We also hope to establish a tight minimax lower bound of sparse estimation under ULDP.
Currently, we consider a support estimation based algorithm. As suggested by the reviewers, an interesting topic would be an algorithm that simultaneously learns the sparse coefficients and optimizes the model, potentially with a Lasso-type optimization objective. Directly solving such a problem is ineffective (Bassily & Sun, 2023). Each update step will involve updating redundant parameters, whose information needs to be protected under differential privacy. Thus, excessive random noise is injected. By utilizing support estimation, we circumvent this issue in the second phase, leading to improved final rates. A private analog for algorithms with limited message passing each round is promising, such as least-angle regression (LARS) or coordinate gradient descent.
Impact Statement
We believe that it is difficult to clearly foresee societal consequence of the present work, which has a primary focus on machine learning theory and methodology. We believe this work can serve as a forward step to enclosing the gap between the theoretical study of LDP and practical situations.
Acknowledgement
We would like to thank the reviewers for their help and advice, which led to a significant improvement of the article. We also thank Yifan Gu for providing discussion on variable selection issues. The research is supported by the Special Funds of the National Natural Science Foundation of China (Grant No. 72342010). Yuheng Ma is supported by the Outstanding Innovative Talents Cultivation Funded Programs 2023 of Renmin University of China. This research is also supported by Public Computing Cloud, Renmin University of China.
References
- Acharya et al. (2020) Acharya, J., Canonne, C. L., Sun, Z., and Tyagi, H. Unified lower bounds for interactive high-dimensional estimation under information constraints. arXiv preprint arXiv:2010.06562, 2020.
- Acharya et al. (2021) Acharya, J., Kairouz, P., Liu, Y., and Sun, Z. Estimating sparse discrete distributions under privacy and communication constraints. In Proceedings of the 32nd International Conference on Algorithmic Learning Theory, volume 132 of Proceedings of Machine Learning Research. PMLR, 16–19 Mar 2021.
- Acharya et al. (2023) Acharya, J., Liu, Y., and Sun, Z. Discrete distribution estimation under user-level local differential privacy. In International Conference on Artificial Intelligence and Statistics, pp. 8561–8585. PMLR, 2023.
- Alabi et al. (2022) Alabi, D., McMillan, A., Sarathy, J., Smith, A., and Vadhan, S. Differentially private simple linear regression. Proceedings on Privacy Enhancing Technologies, 2022.
- Ali et al. (2019) Ali, A., Kolter, J. Z., and Tibshirani, R. J. A continuous-time view of early stopping for least squares regression. In The 22nd international conference on artificial intelligence and statistics, pp. 1370–1378. PMLR, 2019.
- Amin et al. (2023) Amin, K., Joseph, M., Ribero, M., and Vassilvitskii, S. Easy differentially private linear regression. In The Eleventh International Conference on Learning Representations, 2023.
- Arora et al. (2022) Arora, R., Bassily, R., Guzmán, C., Menart, M., and Ullah, E. Differentially private generalized linear models revisited. Advances in Neural Information Processing Systems, 35:22505–22517, 2022.
- Avella-Medina et al. (2023) Avella-Medina, M., Bradshaw, C., and Loh, P.-L. Differentially private inference via noisy optimization. The Annals of Statistics, 51(5):2067–2092, 2023.
- Barik & Honorio (2020) Barik, A. and Honorio, J. Exact support recovery in federated regression with one-shot communication. arXiv preprint arXiv:2006.12583, 2020.
- Bassily & Sun (2023) Bassily, R. and Sun, Z. User-level private stochastic convex optimization with optimal rates. In International Conference on Machine Learning, pp. 1838–1851. PMLR, 2023.
- Bassily et al. (2020) Bassily, R., Nissim, K., Stemmer, U., and Thakurta, A. Practical locally private heavy hitters. The Journal of Machine Learning Research, 21(1):535–576, 2020.
- Belloni & Chernozhukov (2013) Belloni, A. and Chernozhukov, V. Least squares after model selection in high-dimensional sparse models. Bernoulli, 19(2):521, 2013.
- Bergdoll (2019) Bergdoll, R.-D. Mip-2016-regression, 2019. URL https://www.openml.org/search?type=data&status=active&id=41702.
- Cai et al. (2021) Cai, T. T., Wang, Y., and Zhang, L. The cost of privacy: Optimal rates of convergence for parameter estimation with differential privacy. The Annals of Statistics, 49(5):2825–2850, 2021.
- Cai et al. (2023) Cai, Z., Li, S., Xia, X., and Zhang, L. Private estimation and inference in high-dimensional regression with fdr control. arXiv preprint arXiv:2310.16260, 2023.
- Cohen et al. (2023) Cohen, E., Lyu, X., Nelson, J., Sarlos, T., and Stemmer, U. Hot pate: Private aggregation of distributions for diverse task. arXiv preprint arXiv:2312.02132, 2023.
- Cortez et al. (2009) Cortez, P., Cerdeira, A., Almeida, F., Matos, T., and Reis, J. Modeling wine preferences by data mining from physicochemical properties. Decision support systems, 47(4):547–553, 2009.
- Cummings et al. (2022) Cummings, R., Feldman, V., McMillan, A., and Talwar, K. Mean estimation with user-level privacy under data heterogeneity. Advances in Neural Information Processing Systems, 35:29139–29151, 2022.
- Dieuleveut et al. (2017) Dieuleveut, A., Flammarion, N., and Bach, F. Harder, better, faster, stronger convergence rates for least-squares regression. The Journal of Machine Learning Research, 18(1):3520–3570, 2017.
- DrivenData (2021a) DrivenData. Loan default prediction - imperial college london, 2021a. URL https://www.kaggle.com/c/loan-default-prediction/data.
- DrivenData (2021b) DrivenData. Differential privacy temporal map challenge: Sprint 3 (prescreened arena), 2021b. URL https://www.drivendata.org/competitions/77/deid2-sprint-3-prescreened/page/332/.
- Duchi & Rogers (2019) Duchi, J. and Rogers, R. Lower bounds for locally private estimation via communication complexity. In Conference on Learning Theory, pp. 1161–1191. PMLR, 2019.
- Duchi et al. (2018) Duchi, J., Jordan, M., and Wainwright, M. Minimax optimal procedures for locally private estimation. Journal of the American Statistical Association, 113(521):182–201, 2018.
- Dwork et al. (2006) Dwork, C., McSherry, F., Nissim, K., and Smith, A. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference, pp. 265–284. Springer, 2006.
- Fan & Li (2001) Fan, J. and Li, R. Variable selection via nonconcave penalized likelihood and its oracle properties. Journal of the American statistical Association, 96(456):1348–1360, 2001.
- Fan & Lv (2008) Fan, J. and Lv, J. Sure independence screening for ultrahigh dimensional feature space. Journal of the Royal Statistical Society Series B: Statistical Methodology, 70(5):849–911, 2008.
- Fan & Lv (2011) Fan, J. and Lv, J. Nonconcave penalized likelihood with np-dimensionality. IEEE Transactions on Information Theory, 57(8):5467–5484, 2011.
- Fan et al. (2014) Fan, J., Xue, L., and Zou, H. Strong oracle optimality of folded concave penalized estimation. Annals of statistics, 42(3):819, 2014.
- Ghazi et al. (2021) Ghazi, B., Kumar, R., and Manurangsi, P. User-level differentially private learning via correlated sampling. Advances in Neural Information Processing Systems, 34:20172–20184, 2021.
- Ghazi et al. (2023) Ghazi, B., Kamath, P., Kumar, R., Manurangsi, P., Meka, R., and Zhang, C. On user-level private convex optimization. In International Conference on Machine Learning, pp. 11283–11299. PMLR, 2023.
- Girgis et al. (2022) Girgis, A. M., Data, D., and Diggavi, S. Distributed user-level private mean estimation. In 2022 IEEE International Symposium on Information Theory (ISIT), pp. 2196–2201. IEEE, 2022.
- Guyon et al. (2019) Guyon, I., Sun-Hosoya, L., Boullé, M., Escalante, H. J., Escalera, S., Liu, Z., Jajetic, D., Ray, B., Saeed, M., Sebag, M., et al. Analysis of the automl challenge series. Automated Machine Learning, 177, 2019.
- Hsu et al. (2012) Hsu, D., Kakade, S. M., and Zhang, T. A tail inequality for quadratic forms of subgaussian random vectors. Electronic Communications in Probability, 17:1, 2012.
- Hu et al. (2022) Hu, L., Ni, S., Xiao, H., and Wang, D. High dimensional differentially private stochastic optimization with heavy-tailed data. In Proceedings of the 41st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, pp. 227–236, 2022.
- Johnstone (1994) Johnstone, I. M. On minimax estimation of a sparse normal mean vector. The Annals of Statistics, pp. 271–289, 1994.
- Kairouz et al. (2014) Kairouz, P., Oh, S., and Viswanath, P. Extremal mechanisms for local differential privacy. Advances in neural information processing systems, 27, 2014.
- Kairouz et al. (2016) Kairouz, P., Bonawitz, K., and Ramage, D. Discrete distribution estimation under local privacy. In International Conference on Machine Learning, pp. 2436–2444. PMLR, 2016.
- Kent et al. (2024) Kent, A., Berrett, T. B., and Yu, Y. Rate optimality and phase transition for user-level local differential privacy. arXiv preprint arXiv:2405.11923, 2024.
- Khanna et al. (2023a) Khanna, A., Lu, F., and Raff, E. The challenge of differentially private screening rules. arXiv preprint arXiv:2303.10303, 2023a.
- Khanna et al. (2023b) Khanna, A., Lu, F., and Raff, E. Sparse private lasso logistic regression. arXiv preprint arXiv:2304.12429, 2023b.
- Kifer et al. (2012) Kifer, D., Smith, A., and Thakurta, A. Private convex empirical risk minimization and high-dimensional regression. In Conference on Learning Theory, pp. 25–1. JMLR Workshop and Conference Proceedings, 2012.
- Kumar & Deisenroth (2019) Kumar, K. and Deisenroth, M. P. Differentially private empirical risk minimization with sparsity-inducing norms. arXiv preprint arXiv:1905.04873, 2019.
- LeDell (2020) LeDell, E. Airlines depdelay 10m, 2020. URL https://www.openml.org/search?type=data&status=active&id=42728.
- Levy et al. (2021) Levy, D., Sun, Z., Amin, K., Kale, S., Kulesza, A., Mohri, M., and Suresh, A. T. Learning with user-level privacy. Advances in Neural Information Processing Systems, 34:12466–12479, 2021.
- Liang et al. (2023) Liang, J., Wang, C., Zhang, D., Xie, Y., Zeng, Y., Li, T., Zuo, Z., Ren, J., and Zhao, Q. Vsolassobag: a variable-selection oriented lasso bagging algorithm for biomarker discovery in omic-based translational research. Journal of Genetics and Genomics, 50(3):151–162, 2023.
- Liu et al. (2022) Liu, X., Kong, W., and Oh, S. Differential privacy and robust statistics in high dimensions. In Conference on Learning Theory, pp. 1167–1246. PMLR, 2022.
- Liu et al. (2020) Liu, Y., Suresh, A. T., Yu, F. X. X., Kumar, S., and Riley, M. Learning discrete distributions: user vs item-level privacy. Advances in Neural Information Processing Systems, 33:20965–20976, 2020.
- Ma & Yang (2024) Ma, Y. and Yang, H. Optimal locally private nonparametric classification with public data. Journal of Machine Learning Research, 2024.
- Ma et al. (2024a) Ma, Y., Jia, K., and Yang, H. Locally private estimation with public features. arXiv preprint arXiv:2405.13481, 2024a.
- Ma et al. (2024b) Ma, Y., Zhang, H., Cai, Y., and Yang, H. Decision tree for locally private estimation with public data. Advances in Neural Information Processing Systems, 36, 2024b.
- Narayanan et al. (2022) Narayanan, S., Mirrokni, V., and Esfandiari, H. Tight and robust private mean estimation with few users. In International Conference on Machine Learning, pp. 16383–16412. PMLR, 2022.
- Ndaoud (2019) Ndaoud, M. Interplay of minimax estimation and minimax support recovery under sparsity. In Algorithmic Learning Theory, pp. 647–668. PMLR, 2019.
- Papernot & Steinke (2021) Papernot, N. and Steinke, T. Hyperparameter tuning with renyi differential privacy. In International Conference on Learning Representations, 2021.
- Pedregosa et al. (2011) Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., and Duchesnay, E. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830, 2011.
- Qin et al. (2016) Qin, Z., Yang, Y., Yu, T., Khalil, I., Xiao, X., and Ren, K. Heavy hitter estimation over set-valued data with local differential privacy. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp. 192–203, 2016.
- Raff et al. (2023) Raff, E., Khanna, A. A., and Lu, F. Scaling up differentially private lasso regularized logistic regression via faster frank-wolfe iterations. In Thirty-seventh Conference on Neural Information Processing Systems, 2023.
- Smith et al. (2017) Smith, A., Thakurta, A., and Upadhyay, J. Is interaction necessary for distributed private learning? In 2017 IEEE Symposium on Security and Privacy (SP), pp. 58–77. IEEE, 2017.
- Talwar et al. (2015) Talwar, K., Guha Thakurta, A., and Zhang, L. Nearly optimal private lasso. Advances in Neural Information Processing Systems, 28, 2015.
- Tibshirani (1996) Tibshirani, R. Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society Series B: Statistical Methodology, 58(1):267–288, 1996.
- Tramèr et al. (2022) Tramèr, F., Kamath, G., and Carlini, N. Considerations for differentially private learning with large-scale public pretraining. arXiv preprint arXiv:2212.06470, 2022.
- Varshney et al. (2022) Varshney, P., Thakurta, A., and Jain, P. (nearly) optimal private linear regression for sub-gaussian data via adaptive clipping. volume 178 of Proceedings of Machine Learning Research, pp. 1126–1166. PMLR, 2022.
- Wainwright (2019) Wainwright, M. J. High-dimensional statistics: A non-asymptotic viewpoint, volume 48. Cambridge University Press, 2019.
- Wang & Xu (2019) Wang, D. and Xu, J. On sparse linear regression in the local differential privacy model. In International Conference on Machine Learning, pp. 6628–6637. PMLR, 2019.
- Wang et al. (2011) Wang, S., Nan, B., Rosset, S., and Zhu, J. Random lasso. The annals of applied statistics, 5(1):468, 2011.
- Wang et al. (2023) Wang, S., Li, Y., Zhong, Y., Chen, K., Wang, X., Zhou, Z., Peng, F., Qian, Y., Du, J., and Yang, W. Locally private set-valued data analyses: Distribution and heavy hitters estimation. IEEE Transactions on Mobile Computing, 2023.
- Wang (2018) Wang, Y. Revisiting differentially private linear regression: optimal and adaptive prediction & estimation in unbounded domain. In Proceedings of the Thirty-Fourth Conference on Uncertainty in Artificial Intelligence, pp. 93–103, 2018.
- Warner (1965) Warner, S. L. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60(309):63–69, 1965.
- Wilcoxon (1992) Wilcoxon, F. Individual comparisons by ranking methods. In Breakthroughs in statistics, pp. 196–202. Springer, 1992.
- Zhang & Zhang (2021) Zhang, Z. and Zhang, L. High-dimensional differentially-private em algorithm: Methods and near-optimal statistical guarantees. arXiv preprint arXiv:2104.00245, 2021.
- Zhao & Yu (2006) Zhao, P. and Yu, B. On model selection consistency of lasso. The Journal of Machine Learning Research, 7:2541–2563, 2006.
- Zheng et al. (2017) Zheng, K., Mou, W., and Wang, L. Collect at once, use effectively: Making non-interactive locally private learning possible. In International Conference on Machine Learning, pp. 4130–4139. PMLR, 2017.
- Zhou et al. (2022) Zhou, M., Wang, T., Chan, T. H., Fanti, G., and Shi, E. Locally differentially private sparse vector aggregation. In 2022 IEEE Symposium on Security and Privacy (SP), pp. 422–439. IEEE, 2022.
- Zhu et al. (2023) Zhu, L., Ding, M., Aggarwal, V., Xu, J., and Wang, D. Improved analysis of sparse linear regression in local differential privacy model. arXiv preprint arXiv:2310.07367, 2023.
- Zhu et al. (2020) Zhu, W., Kairouz, P., McMahan, B., Sun, H., and Li, W. Federated heavy hitters discovery with differential privacy. In International Conference on Artificial Intelligence and Statistics, pp. 3837–3847. PMLR, 2020.
In this appendix, we provide the omitted content for minimax lower bound (Appendix A), the algorithm and theoretical results of candidate variable selection (Appendix B), the algorithm and theoretical results of coefficient estimation (Appendix C), an extension from our framework to general problems (Appendix D), and details as well as additional results of experiments (Appendix E).
Appendix A Minimax Lower Bound
We first borrow assumptions and definitions from Acharya et al. (2020). Let be a random variable over such that for all and the s are all independent; we denote this distribution by . For , we denote as the vector obtained by flipping the sign of the -th coordinate of .
Condition A.1.
For every and it holds that (we refer to simply as ), and there exist measurable functions such that
Condition A.2.
There exists some such that, for all and distinct and .
Condition A.3.
For every ,
where denotes the Hamming distance, where and denotes sparsity and error rate respectively.
Proof of Theorem 2.4.
First, suppose is uniformly distributed on for . Let
for where s are i.i.d. random variables with
There holds satisfies the conditions that and with probability using Fact 1 in Acharya et al. (2020). Next, for each we let:
Thus, . The above distribution satisfies (1) with probability . The distribution has density function for . Then, for the -th user who has the data sample from the distribution , it sends its information through a private algorithm after getting messages . By definition, for , we have
(8) |
where the last step follows from Zhu et al. (2023). If we let to be small enough, we can guarantee that for each and . We compute the transformation of the above quantity which is . For each , we bound the expectation by Jensen’s inequality
(9) |
For each , we have
(10) |
Bringing (10) into (9) leads to
As a result, the expectation of the log transformation has
(11) |
Moreover, since for , we have
Recall that . Thus, applying Hoeffding’s inequality with union bound yields
(12) |
for all and with with probability at least . As a result, plugging (11) and (12) into (8) yields
Since , for sufficiently small , one can justify condition A.1 and A.2 for the defined , with . Applying Corollary 1 in Acharya et al. (2020) leads to
(13) |
Note that this result, as well as Lemma 3 of Acharya et al. (2020) in the following, are developed for being a single sample. They are extendable to being multiple samples since we can apply the original conclusion to the dimensional vector, formulated by stacking the s. Next we focus on lower bound of the total variation distance. Since
i.e. Condition A.3 holds, applying Lemma 3 of Acharya et al. (2020) leads to
(14) |
∎
Proof of Proposition 2.3.
We follow the same construction as in the proof of Theorem 2.4 while adopting a different strategy to bound . Namely, we let
(15) |
Then one can justify condition A.1 and A.2 for the defined , with
Applying Corollary 1 in Acharya et al. (2020) leads to
(16) |
There holds similarly
(17) |
Combining (16) and (17) leads to
which yields
Note that if and , there holds
which yields the desired result. Note that in this case, the constructed function class has beta-min condition with which is a constant in a .
∎
Appendix B Candidate Variable Selection
B.1 Good Selectors
B.1.1 Plug-in High Dimensional Variable Selection
In the following, we provide some example selectors and demonstrate that, under mild assumptions, they serve as components of a good selector. We introduce commonly used variable selection approaches along with their associated theoretical results. Our goal is twofold. Firstly, we want the true variables to be selected. Conversely, the redundant variables that are selected should be as few as possible. We derive this from the perfect selection property (also known as strong oracle or consistent selection), which asserts that our goal is achieved with a high probability. The primary conditions we impose on the potential distributions fall into two categories:
-
•
Beta-min conditions, which necessitate that is greater than a specified threshold. With this condition, the signal strength from the regression functions is robust enough for the selector to identify the variables..
-
•
Mild correlation conditions, which require that the correlation between the true and redundant variables is weak enough for the selectors to distinguish.
In this section, we omit the user index and write representing the data of some user , since the results in the section consider one local dataset at a time.
Example B.1 (Lasso (Tibshirani, 1996)).
Lasso, or Least Absolute Shrinkage and Selection Operator, is a regularization technique in statistical learning that adds a penalty term to the linear regression objective function, effectively promoting sparsity by encouraging some of the model coefficients to be exactly zero. Specifically, Lasso solves the regularized optimization object
(18) |
Used for variable selection, Lasso identifies the non-zero elements of the optimization solution as the selected variable.
To study the selection consistency of Lasso, Zhao & Yu (2006) proposed a general condition called the Irrepresentable condition. Specifically, for , let the block matrix
Here is a matrix, corresponding to the covariance matrix of the true variables. Irrepresentable Condition states that there exists a positive constant vector
(19) |
where is a vector with elementwisely. The following result holds for irrepresentable condition.
Lemma B.2.
Under our assumptions, when using (18) as selector, let be the solution. Suppose (19) holds. Suppose the following conditions hold: (i) . (ii) . Then there exists a constant such that, for sufficiently large , with probability , there holds
Moreover, for , if for , then we have the Irrepresentable Condition.
Proof of Lemma B.2.
Since we assume sub-Gaussian noises, any -th moment of the random noise exists, i.e. can be arbitrarily large. As a result, any implies for some . By Theorem 3 in Zhao & Yu (2006), for sufficiently large , the probability of
is larger than some constant , given that the conditions (5,6,7,8) are satisfied. Thus it suffices to verify the conditions. Condition (5) and (6) holds naturally due to our assumption of i.i.d. designs and boundedness of covariance matrix norm. (7) and (8) are in our assumptions. As for the last statement, Zhao & Yu (2006) provides several commonly seen sufficient conditions for the irrepresentable condition to hold, such as when . If , then for some constant and sufficiently large . This bound holds for all users and all position , if we apply union bound, where we need , i.e. . Note here we assumed . Thus the lemma is proved. ∎
Example B.3 (SCAD (Fan & Li, 2001)).
SCAD, or smoothly clipped absolute deviation, is a non-convex penalty function used in statistical learning and regression analysis. It is designed to address limitations of traditional L1 regularization methods like Lasso by providing a smooth and more robust penalty on regression coefficients, promoting sparsity while mitigating some of the biases associated with sharp discontinuities in penalty functions. Specifically, SCAD solves the regularized optimization object
(20) |
Used for variable selection, SCAD identifies the non-zero elements of the optimization solution as the selected variable.
The following lemma, which is a straightforward implication of Fan & Lv (2011), states that the essential condition for SCAD estimator to consistently select the variables is the Beta-min condition, given that the sample size is relatively large.
Lemma B.4.
Under our assumptions, when using (20) as selector, let be the solution. Suppose the following conditions hold: (i) The sparsity is . (ii) . (iii) . Then there exists a constant and a suitable choice of such that, for sufficiently large , with probability , there holds
Proof of Lemma B.4.
By Theorem 3 in Fan & Lv (2011), for sufficiently large , the probability of
is larger than some constant , given that the regularity conditions in the theorem are satisfied. Note that we have . Thus it suffices to verify the conditions. The condition 1 is satisfied by SCAD penalty. Condition 5 is satisfied by our setting of sample size (note that for defined in their context). (26) and (28) of Condition 2 follows from our assumptions on the upper and lower bound of and the estimation error of covariance matrix which is (Wainwright, 2019). (27) comes from . ∎
B.1.2 Proof of Proposition 3.2
Proof of Proposition 3.2.
Under the two conditions, using Lemma B.2 and B.4, we can show that there exists a variable selection method that perfectly select the true variables with a positive probability . Then by sampling among the selected variables, the probability can be computed as
for . This yields the desired conclusion. ∎
B.1.3 Computational Issue
For SCAD, the incorporation of a non-convex penalty proves effective in attaining coefficient sparsity while maintaining oracle properties. Nonetheless, the non-convex nature introduces a challenge—the guarantee of solution uniqueness becomes elusive, leading to the presence of multiple local optima. Consequently, the stability of results may be compromised. Fan et al. (2014) introduce additional concave parameter to ensure consistency, which contributes to increased computational complexity, further posing challenges in the computational efficiency of SCAD. As a result, Lasso is more preferable In practice. We introduce another technique which can be useful to enhance the computation efficiency.
Example B.5 (Screening (Fan & Lv, 2008)).
Sure Independence Screening (SIS) is a feature selection method in statistical learning that aims to identify relevant variables in high-dimensional datasets. It does so by assessing the correlation between each predictor and the response variable, and selecting a subset with the highest scores. Specifically, For , let
Then the most largest position of are identified as the selected variables. Screening can be a valuable pre-procedure for other selection methods. Screening is employed to quickly identify and retain a subset of potentially important features, reducing the dimensionality of the data before applying more computationally intensive or elaborate feature selection techniques.
B.2 Aggregation of Local Selected Variables
In this section, we present the omitted algorithm and technical proofs for the aggregation step after local variable selection. In B.2.1, we introduce the detailed variable selection algorithm. In B.2.2, we present proofs omitted in Section 3.1.
B.2.1 Heavy Hitter Algorithm
First, we introduce necessary definitions. Let be a collection of binary prefixes. The define ChildSet . We define several public randomness that will be shared among users. See Bassily et al. (2020, Section 3.1) for details. Let for some . Define integer and . We will consider a set of pairs of hash functions , where for each and are independently and uniformly chosen pairwise independent hash functions. We assume that the server creates a random partition that assigns to each user a random pair , as in the initialization of Algorithm 4. We also have another random function that assigns to each user a uniformly random index . We assume that such random indices are shared between the server and each user. Finally, we adopt shared encoding and decoding schemes for bijection between and binary strings, denoted as Encoding and Decoding, respectively.
Before presenting the HeavyHitter, we first introduce the functions it uses. The following algorithm generate a private report for a single user. We seal the information of each into a binary value that is the Hardamard transform of hashes of its prefix. The information is privatized using the random response mechanism (Warner, 1965) and sent to the curator.
The following algorithm shows how LocalRnd is invoked multiple times to scan the prefix tree.
The final algorithm is presented in Algorithm 4. We modify the algorithm in Bassily et al. (2020) by removing the second phase of frequency estimation, since we only want to identify the heavy hitters and do not care about their frequencies. This allows a saving of budget.
B.2.2 Proof Related to Section 3.1
To give the proof of Proposition 3.3, we need the following necessary technical result.
Lemma B.6.
Algorithm 4 is - ULDP. Moreover, if , then with probability at least , the output list of the HeavyHitter protocol satisfies the following properties given sufficiently large : (i) it contains all items whose true frequencies above . (ii) it does not contain any item whose true frequency below .
Proof of Lemma B.6.
Lemma 5.3 in Bassily et al. (2020) yields that the variables retained in Prefixes in Algorithm 4 has . Since , we have for sufficiently large . Then for any in Prefixes, we have . On the contrary, if , then , which will be included in Prefixes.
∎
Proof of Proposition 3.3.
For notation simplicity, we denote the number of users and selectors used in the selection as instead of throughout this proof. We compute the frequency of variable , namely . By Hoeffding’s inequality, we have
Applying union bound, we get
(21) |
For conclusion (i), since is generated by a good selector, Definition 3.1 yields that
for . This together with (21) leads to
for any and sufficiently large . Then for any , by Lemma B.6, we have . This means the frequency of any true variable must be large enough to be detected as a heavy hitter. Next, we show (ii). Suppose that there are variables satisfying , i.e. potentially identified by the heavy hitters by Lemma B.6. Then by applying (21), there holds
for sufficiently large , with probability at least . However, there holds
which indicates that .
∎
Appendix C Coefficient Estimation
C.1 The Multiple Round Protocol
C.1.1 SCO Algorithm
We use the same algorithm as in the Bassily & Sun (2023) while adopting a different set of default values of its parameters. Such changes are due to the differential technical requirements for the theoretical analysis with strong convexity. Also, the algorithm requires a solution to the user-level locally differentially private mean estimation (ULDPMean), which is presented later in Section C.2.2. For notation simplicity, we denote the number of users and selectors used in the selection as instead of in this section.
For the algorithm, we have the following result. Note that Algorithm 5 adopts disjoint mini-batch when computing the gradients while Lemma C.1 was established completely based on stochastic gradient descent. Yet, the theoretical analysis generalize straightforwardly.
Lemma C.1 (Theorem 3 of Dieuleveut et al. (2017)).
For clearness, we additionally include the full multi-round protocol.
C.1.2 Proof of Theorem 3.4
We need the following technical result which states the effectiveness of optimization procedures in Algorithm 5.
Lemma C.2.
Proof of Lemma C.2.
The privacy guarantee comes from the privacy of Algorithm 9 and the fact that each batch of samples are disjoint. For the privacy guarantee, consider the mean squared error
By assumption on , we have
Thus, it suffices to bound and the estimation error is of the same order. Note that under the assumption , the squared loss function constraint on the unit ball has
i.e. -Lipschitzness. Let be the parameter trajector of Algorithm 5. Let be the parameter trajectory of another algorithm which replaces the gradient estimate by
By analysis analogous to the proof of Lemma C.5, if we take , there holds
with probability for all , where stands for equal in distribution. Hence we have
(22) |
For , we use the fact that and, by Lemma C.5,
Applying Lemma C.1, we have
Taking , this together with (22) lead to
∎
Theorem C.3 (Formal version of Theorem 3.4).
Proof of Theorem C.3.
By Lemma B.6 and C.2, both HeavyHitter and ULDPSCO are -ULDP. Since their associated users do not cross, we have Algorithm 6 is also -ULDP. As for (ii), by Proposition 3.3, we know that all the non-zero variables of is included in with probability . Thus, we have
Applying Lemma C.2, this leads to
where in the last step we used as in Proposition 3.3. The additional term is due to the failure probability of Proposition 3.3 and is omitted since it is adjustable to any level with a constant multiplicative cost on the other terms. ∎
C.2 The Two Round Protocol
C.2.1 Proof of Proposition 3.5
Proof of Proposition 3.5.
For the first conclusion, consider th local OLS estimator on selected variables of user , which is . Given the fact that , is invertible and we have
where are i.i.d. sub-Gaussian random variables for . Therefore, the first argument follows from
By implication of Hsu et al. (2012, Theorem 2.1), we have
This together with covariance matrix estimation bounds ( e.g. Wainwright (2019, Theorem 6.5)) lead to
(23) |
with probability . Applying union bound, (23) holds for all with probability at least . For the second statement, if either conditions in Proposition 3.2 holds, we can adopt Lasso (or SCAD) on the selected variables. See Example B.1 and B.3. The oracle results in Belloni & Chernozhukov (2013) (or Fan & Lv (2011)) yield the concentration bound with the true sparsity parameter
for all with probability at least . ∎
C.2.2 ULDP Mean Estimation
We borrow the idea from Girgis et al. (2022) while slight modifications are made. The estimation is conducted in two stages. In the first stage, a histogram partition of with bin width is created. The server privately estimates the range in which the means lie with high probability (Algorithm 7). In the second stage, each user projects its into the determined range from the first step. Then, all users send the LDP versions of their projected to the curator (Algorithm 8). Both steps are scalar operations. In the vector case, instead of applying them to each dimension separately, random rotation (Levy et al., 2021) is adopted to eliminate a superfluous factor of . The full algorithm is summarized in Algorithm 9. We only consider pure differential privacy here and utilize Laplace noise instead of Gaussian in Girgis et al. (2022).
Let the standard Laplace random variable have probability density function for .
The following lemma is a modified version of Theorem 2 of Girgis et al. (2022) under pure differential privacy.
Lemma C.4.
Let be the true underlying coefficient, and s be the coefficients estimated by each user. Suppose and with probability for all . Then with probability , we have
Proof of Lemma C.4.
We know the s satisfy Definition 2 in Girgis et al. (2022) with parameter . By Levy et al. (2021), we have
If we choose , then satisfy Definition 2 in Girgis et al. (2022) with parameter . Then the Lemma 1 of Girgis et al. (2022) implies that with probability in Algorithm 8. Then the least square error for Mean is
where the inequality follows from (2.18) in Wainwright (2019). Since is upper bounded by times infinity norm, there holds
∎
The following lemma is the key technical result to prove Theorem 3.6.
Lemma C.5 (Privacy and utility of Algorithm 9).
Let be the true underlying coefficient, and s be the coefficients estimated by each user. Then the algorithm 9 is -ULDP. Moreover, there exists some such that, with probability , we have
Proof of Lemma C.5.
We first show the privacy property of Algorithm 9. Since the users of Range and Mean do not across, it suffices to show that both of the algorithms are -ULDP. The privacy of Range follows from Lemma 1 of Girgis et al. (2022). The privacy of Mean is straightforward by property of Laplace mechanism, given that the sensitivity of is . Now we prove the accuracy part. The squared error can be decomposed into two parts associating to private estimation error and non-private estimation error, respectively.
We deal with private estimation error part first. From Proposition 3.5, we know the s satisfy Lemma C.4 with . Then we have
(24) |
If either conditions in Proposition 3.2 holds, the parameter becomes by Proposition 3.5, and the same analysis goes with instead of .
(25) |
Next, we bound the non-private estimation error. When is the OLS estimator, by its sub-Gaussianality, we have
(26) |
If either conditions in Proposition 3.2 holds, this becomes
(27) |
Together, (24) and (26) lead to
The overall failure probability is at least since we utilized two high probability arguments. Similarly, (25) and (27) lead to
∎
C.2.3 Proof of Theorem 3.6
Proof of Theorem 3.6.
By Lemma B.6 and C.5, both HeavyHitter and ULDPMean are -ULDP. Since their associated users do not cross, we have Algorithm 1 is also -ULDP. As for (ii), by Proposition 3.3, we know that all the non-zero variables of is included in with probability . Thus, we have
Applying Lemma C.5, this leads to
where in the last step we used Proposition 3.3. In the last, the overall failure probability of Proposition 3.3, Lemma B.6, and Lemma C.5 is at most . ∎
Appendix D Extension to Sparse Estimation
The full statement of Theorem 3.7 is as follows. We utilize Algorithm 1 while modifying the estimators and selectors to accommodate the general problem.
Theorem D.1 (Formal version of Theorem 3.7).
Let data be generated by for . Suppose we have non-private estimators: (i) estimator with for all and (ii) estimator on selected variables with and for all . Then there exist -good selectors with , that is for and . Suppose we let , . Then, for any , Algorithm 1 is -ULDP and has an output with
(28) |
with probability at least . Moreover, for norm, there holds
(29) |
with probability at least .
Proof of Theorem D.1.
The privacy guarantee follows from Theorem 3.6. Since , we can consistently select all true variables with proxy estimators. This implies we can have -good selectors with . By Proposition 3.3, we know that all the non-zero variables of is selected with probability . Thus, we have . Applying Lemma C.4, we have
Since are concentrated, it is sub-Gaussian. Thus, there holds
where in the last step we used Proposition 3.3. In the last, the overall failure probability of Proposition 3.3, Lemma B.6, and Lemma C.4 is at most . This yields (28). For (29), note that there is only none zero elements. Using the difference between and norms, which is , yields (29). ∎
Appendix E Additional Experiment Results
E.1 Implementation Details
For each model, we report the best result over its parameter grids, with the best result determined based on the average result of at least 30 replications. We do not perform any parameter selection (e.g. cross validation or validation set) since they are prohibitive under locally private setting (Ma & Yang, 2024; Ma et al., 2024a) or will cost too much privacy budget (Papernot & Steinke, 2021). The parameter grids size are selected based on running time so that each method costs equal amount of computation. Efficient methods receive a exhaustive parameter grid and can be properly tuned. Computation heavy methods receive a small grid with insensitive parameters set to default.
-
•
For candidate variable selector of our methods, we adopt the Lasso estimator and identify its non-zero coefficients as the selected variables. Moreover, we conduct a feature screening (see Appendix B.1 for detail) for acceleration. The number of screened variables is set to 64. The number of selected variables is selected in .
-
–
2-SLR: The two-round sparse linear regression protocol is implemented based on Algorithm 1. We select the range in and the concentration radius is decided by the number of bins, which is in .
-
–
M-SLR: The multi-round sparse linear regression protocol is implemented based on Algorithm 6. We set and select the number of bins in . Moreover, we set the learning rate of the gradient to be .
-
–
-
•
LDPPROX: The non-interactive locally differentially private sparse linear regressor based on proxy estimator is implemented according to Algorithm 1 in Zhu et al. (2023). Due to the heavy computation burden, we set , , . In simulation where we know , we set . In real data, we set to the 10-th lower quantile of the absolute fitted coefficients.
-
•
LDPIHT: The locally differentially private iterative hard thresholding is implemented according to Algorithm 2 in Zhu et al. (2023). We select , , , .
-
•
Lasso: The conventional Lasso regressor is fitted using the LassoCV class in scikit-learn package (Pedregosa et al., 2011). We set , , and .
E.2 Additional Simulation Results
We present the additional result of the correlated marginal distribution data experiment omitted in the main text due to page limitation. The correlation of the first 50 dimensions are set to be exponentially decaying, i.e.
We draw each correlatedly from a standard Gaussian distribution. For , we randomly select coordinates in the first 50 dimensions to be and let others be zero. We typically set , , , and , while varying one of them to observe how the evaluated metric varies. We use squared error as evaluation of the estimated coefficient and F1 score as evaluation of the selected variables.
We conduct experiments with respect to . We first analyze the variable selection performance. Due to the high sparsity, we use F1 score as the evaluation criterion. For , we compute the averaged F1 scores of the proposed candidate variable selection (represented by 2-SLR) and other methods. As depicted in Fig. 5(a), the overall performance of all methods deteriorates compared to that under the independent setting, whereas 2-SLR remains stable and maintains its advantage. When , the selection performances of Lasso and LDPPROX are slightly superior than the variables induced by other methods. However, as increases, the variable selection performance of Lasso, LDPIHT and LDPPROX decreases sharply, while the F1 scores of 2-SLR only fluctuate slightly and become higher than those of other competitors when .
Then, we analyze the estimation performance. In 5(b) and 5(c), we plot the curve of error with respect to . Whether or , the proposed methods are less sensitive to compared to LDPIHT. The is also compatible with rate in (5) which scales with . Compared to the independent case, the correlated case requires more local samples to achieve a consistent selection. Thus, thus difference in results for large and small is less apparent.
We examine the privacy-utility trade-offs by investigating performances under different s. In 5(d), the error decreases as increases for all private methods as expected. Moreover, the error of 2-SLR is comparable to Lasso, while error of M-SLR quickly drops below Lasso at medium privacy region . This again ensures the superiority of our methods compared to fitting Lasso using only local information.
Finally, we analyze the impact of sample sizes. In Figure 6(a) and 6(b), the error decreases as both and increases for all , which confirms our theoretical claims. The error is generally higher than that in the independent case. The overall curve is less sensitive to and . Moreover, we let and vary the ratio . In 4(c), we observe that, for each , the error of 2-SLR retains for , while increase slightly when either or is too small, which is compatible with Theorem 3.6. The performance of M-SLR is still sensitive to becoming small.
E.3 Real Dataset Description
A summary of key information for these datasets after pre-processing can be found in Table 3. For user-specific sample partitioning, certain datasets come with predefined partitions, while others undergo random partitioning. Categorical features in the datasets are transformed into dummy variables, while each continuous feature is individually scaled to zero mean and unit variance. We also present additional information of the data sets including the data source and the pre-processing details.
Dataset | Sample Partition | d | n | m | Area |
---|---|---|---|---|---|
Airline | Predefined | 260 | 205 | 200-400 | Social |
Loan | Random | 735 | 500 | 100 | Business |
Mip | Predefined | 144 | 218 | 5 | Computer Science |
Taxi | Predefined | 213 | 1200 | 189-200 | Social |
Wine | Random | 41 | 60 | 100 | Business |
Yolanda | Random | 100 | 800 | 200 | Social |
Airline: The Airlines-Departure-Delay dataset originally comes from United States Department of Transportation and currently available on OpenML (LeDell, 2020), consists of 1,048,575 observations, including one target variable and 9 attributes pertaining to flight information. We partition samples into users based on the ”Destination” variable, selecting users with sample counts ranging from to . Attributes such as ”Origin” and ”UniqueCarrier” are transformed into dummy variables, contributing to a total of features in the ”Airlines” dataset. Overall, the Airlines dataset contains samples.
Loan: The Loan-Default-Prediction dataset is obtained from the training set of the Kaggle Loan Default Prediction challenge (DrivenData, 2021a), which aims to reduce the consumption of economic capital and optimize on the risk to the financial investor. The original dataset comprises 55319 instances of attributes We randomly select samples and partition the data into groups, with each group containing samples.
Mip: The MIP-2016-regression dataset, available on OpenML, comprises instances featuring attributes and output attribute (Bergdoll, 2019). Within this dataset, there are a total of 218 users, with each user possessing 5 samples.
Taxi: The Taxi dataset is obtained from the Differential Privacy Temporal Map Challenge (DrivenData, 2021b), which aims to develop algorithms that preserve data utility while guaranteeing individual privacy protection. The dataset contains quantitative and categorical information about taxi trips in Chicago, including time, distance, location, payment, and service provider. We partition the samples based on the unique identification number of taxis (), resulting in 1200 taxis with sample counts ranging from to . Other features include the time of each trip (), the distance of each trip (), the time period during which each trip occurs(), index of the zone where the trip starts (), index of the zone where the trip ends (), service provider (), the method used to pay for the trip () and amount of tips () and fares (). We use the other variable to predict the fares of the fares () of the trips. Attributes such as , ,, and are transformed into dummy variables, resulting in a total of features in the Taxi dataset.
Wine: This dataset originates from the Wine Quality dataset (Cortez et al., 2009) on UCI Machine Learning Repository, which combines data from both the ”red wine” and ”white wine” datasets. The original dataset comprises features associated with wine to predict the corresponding wine quality. In an effort to enhance dimensionality, Gaussian random noise in dimensions has been incorporated. instances are collected in the dataset. The samples are randomly partitioned among users, with each user having samples.
Yolanda: The Yolanda dataset (Guyon et al., 2019) contains 400000 instances of attributes and output attribute. We randomly select samples and distribute them into groups, with each group containing samples.
E.4 Additional Real Datasets Results
Datasets | Lasso | 2-SLR | M-SLR | LDPPROX | LDPIHT |
---|---|---|---|---|---|
Airline | 0.7 | 15.8 | 15.3 | 766.5 | 6.1 |
Loan | 43.1 | 74.7 | 106.9 | 4124.0 | 30.6 |
MIP | 0.1 | 0.1 | 2.3 | 5.5 | 4.3 |
Taxi | 0.1 | 0.7 | 11.5 | 1569.1 | 7.0 |
Wine | 0.2 | 0.7 | 2.9 | 3.5 | 2.6 |
Yolanda | 0.5 | 0.4 | 12.5 | 365.8 | 4.4 |