close
Skip to main content

PDT-DPFL: Using Polynomial Data Transformations Realize Accurate, Differentially Private Federated Learning

  • Conference paper
  • First Online:
BERJAYA Advanced Intelligent Computing Technology and Applications (ICIC 2025)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15850))

Included in the following conference series:

  • 739 Accesses

  • 1 Citation

Abstract

To protect client privacy in federated learning, Differential Privacy (DP) techniques are widely adopted, but the integration of DP introduces additional heterogeneity among clients, negatively impacting model accuracy. To address the heterogeneity caused by DP, the state-of-the-art method uses linear transformations to adjust data distributions, this reduces the heterogeneity introduced by DP. However, the noise scales proportionally with the linear transformations. For example, certain edge features mixed with noise may be amplified beyond acceptable boundaries, leading to suboptimal results and the loss of critical edge features, thereby limiting improvements in model accuracy. To overcome these challenges, this paper proposes a polynomial transformation method based on generating functions. The method combines nonlinear and linear transformations to adjust client distributions more effectively. By applying polynomial transformations to the original data, it refines the data distribution and captures complex patterns and edge features. As a result, the method reduces client heterogeneity and improves model accuracy. Experimental results demonstrate that the proposed method significantly enhances model accuracy and reduces client heterogeneity across various datasets and privacy budgets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+
from $39.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273–1282. PMLR (2017)

    Google Scholar 

  2. Liu, Y., Zhang, H., Wang, M., Xie, Q., Wang, L.: An efficient privacy enhanced federated learning with single-key homomorphic encryption. IEEE Internet Things J. (2025)

    Google Scholar 

  3. Geiping, J., Bauermeister, H., Dröge, H., Moeller, M.: Inverting gradients-how easy is it to break privacy in federated learning? Adv. Neural. Inf. Process. Syst. 33, 16937–16947 (2020)

    Google Scholar 

  4. Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 739–753. IEEE (2019)

    Google Scholar 

  5. Chen, H., Vikalo, H.: Federated learning in non-IID settings aided by differentially private synthetic data. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 5027–5036 (2023)

    Google Scholar 

  6. Ling, J., Zheng, J., Chen, J.: Efficient federated learning privacy preservation method with heterogeneous differential privacy. Comput. Secur. 139, 103715 (2024)

    Article  Google Scholar 

  7. Stevens, T., Skalka, C., Vincent, C., Ring, J., Clark, S., Near, J.: Efficient differentially private secure aggregation for federated learning via hardness of learning with errors. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 1379–1395 (2022)

    Google Scholar 

  8. Yang, Y., Hui, B., Yuan, H., Gong, N., Cao, Y.: {PrivateFL}: accurate, differentially private federated learning via personalized data transformation. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 1595–1612 (2023)

    Google Scholar 

  9. Rass, S., König, S., Ahmad, S., Goman, M.: Metricizing the Euclidean space towards desired distance relations in point clouds. IEEE Trans. Inf. Forensics Secur. (2024)

    Google Scholar 

  10. Stoica, P., Babu, P.: Pearson–Matthews correlation coefficients for binary and multinary classification. Signal Process. 222, 109511 (2024)

    Article  Google Scholar 

  11. Li, X., Jiang, M., Zhang, X., Kamp, M., Dou, Q.: FEDBN: federated learning on non-IID features via local batch normalization. arXiv preprint arXiv:2102.07623 (2021)

  12. Karimireddy, S.P., Kale, S., Mohri, M., Reddi, S., Stich, S., Suresh, A.T.: Scaffold: stochastic controlled averaging for federated learning. In: International Conference on Machine Learning, pp. 5132–5143. PMLR (2020)

    Google Scholar 

  13. Noble, M., Bellet, A., Dieuleveut, A.: Differentially private federated learning on heterogeneous data. In: International Conference on Artificial Intelligence and Statistics, pp. 10110–10145. PMLR (2022)

    Google Scholar 

  14. Cheddad, A.: On box-cox transformation for image normality and pattern classification. IEEE Access 8, 154975–154983 (2020)

    Article  Google Scholar 

  15. Lin, R., You, Y.: Cobias and debias: minimizing language model pairwise accuracy bias via nonlinear integer programming. arXiv preprint arXiv:2405.07623 (2024)

  16. Wilf, H.S.: Generating Functionology. Elsevier (2013)

    Google Scholar 

  17. Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308–318 (2016)

    Google Scholar 

  18. McMahan, B., et al.: The earth mover’s distance as a metric for image retrieval. Int. J. Comput. Vis. 40, 99–121 (2000)

    Google Scholar 

  19. Yousefpour, A., et al.: Opacus: user-friendly differential privacy library in PyTorch. arXiv preprint arXiv:2109.12298 (2021)

  20. Geyer, R.C., Klein, T., Nabi, M.: Differentially private federated learning: client level perspective. arXiv preprint arXiv:1712.07557 (2017)

Download references

Acknowledgments

This work was supported by the Natural Science Foundation of Hebei Province of China (F2022201005, F2023201033), the Key Re-search and Development Program of Hebei Province of China(22340701D), the Beijing-Tianjin-Hebei Basic Research Collaborative Special Project (F2024201070) and the Horizontal Project (Re-search on Security Protection Scheme for Power Communication Network).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoyan Liang .

Editor information

Editors and Affiliations

Ethics declarations

The authors have no competing interests to declare that are relevant to the content of this article.

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, Y., Liu, Z., Du, R., Liang, X. (2025). PDT-DPFL: Using Polynomial Data Transformations Realize Accurate, Differentially Private Federated Learning. In: Huang, DS., Zhang, C., Zhang, Q., Pan, Y. (eds) Advanced Intelligent Computing Technology and Applications. ICIC 2025. Lecture Notes in Computer Science, vol 15850. Springer, Singapore. https://doi.org/10.1007/978-981-96-9884-4_36

Download citation

Keywords

Publish with us

Policies and ethics