aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorYuchen Pei <me@ypei.me>2019-03-14 11:19:59 +0100
committerYuchen Pei <me@ypei.me>2019-03-14 11:19:59 +0100
commit83b0953fa85b4c7a11edc4bc75b205f38e434a75 (patch)
tree87331c2f79ba996728cef300df0307a7ffb4221a
parentbbc5c5199114837ef77839d3cd145d6c6b0f97e6 (diff)
minor changes
-rw-r--r--posts/2019-03-13-a-tail-of-two-densities.md6
1 files changed, 3 insertions, 3 deletions
diff --git a/posts/2019-03-13-a-tail-of-two-densities.md b/posts/2019-03-13-a-tail-of-two-densities.md
index dda906b..4897874 100644
--- a/posts/2019-03-13-a-tail-of-two-densities.md
+++ b/posts/2019-03-13-a-tail-of-two-densities.md
@@ -25,7 +25,7 @@ on privacy by stating and proving the composition theorems for differential priv
as well as the effect of mixing mechanisms, by presenting the subsampling theorem
(a.k.a. amplification theorem).
-In Part 2, I discuss the Rényi differential privacy, corresponding to
+In [Part 2](/posts/2019-03-14-great-but-manageable-expectations.html), I discuss the Rényi differential privacy, corresponding to
the Rényi divergence, a study of the moment generating functions the
divergence between probability measures to derive the tail bounds.
@@ -923,7 +923,7 @@ compared to the Basic Composition Theorem (Claim 10).
**Remark**. In practice one can try different choices of $\beta$ and settle
with the one that gives the best privacy guarantee.
-See the discussions at the end of Part 2 of this post.
+See the discussions at the end of [Part 2 of this post](/posts/2019-03-14-great-but-manageable-expectations.html).
**Proof**. Let $p_i$, $q_i$, $p$ and $q$ be the laws of
$M_i(x)$, $M_i(x')$, $M(x)$ and $M(x')$ respectively.
@@ -1215,7 +1215,7 @@ have sensitivity $C$. It makes the difference between the query results
of two *arbitrary* inputs bounded by $C$, rather than *neighbouring*
inputs.
-In Part 2 we will use the tools developed above to discuss the privacy
+In [Part 2 of this post](/posts/2019-03-14-great-but-manageable-expectations.html) we will use the tools developed above to discuss the privacy
guarantee for DP-SGD, among other things.
References