Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Privacy-Preserving Machine Learning
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Privacy-Preserving Machine Learning/ by Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li.
Author:
Li, Jin.
other author:
Li, Ping.
Description:
VIII, 88 p. 21 illus., 18 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data protection—Law and legislation. -
Online resource:
https://doi.org/10.1007/978-981-16-9139-3
ISBN:
9789811691393
Privacy-Preserving Machine Learning
Li, Jin.
Privacy-Preserving Machine Learning
[electronic resource] /by Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li. - 1st ed. 2022. - VIII, 88 p. 21 illus., 18 illus. in color.online resource. - SpringerBriefs on Cyber Security Systems and Networks,2522-557X. - SpringerBriefs on Cyber Security Systems and Networks,.
Introduction -- Secure Cooperative Learning in Early Years -- Outsourced Computation for Learning -- Secure Distributed Learning -- Learning with Differential Privacy -- Applications - Privacy-Preserving Image Processing -- Threats in Open Environment -- Conclusion.
This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.
ISBN: 9789811691393
Standard No.: 10.1007/978-981-16-9139-3doiSubjects--Topical Terms:
1366218
Data protection—Law and legislation.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Privacy-Preserving Machine Learning
LDR
:02547nam a22004215i 4500
001
1090453
003
DE-He213
005
20220510012303.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811691393
$9
978-981-16-9139-3
024
7
$a
10.1007/978-981-16-9139-3
$2
doi
035
$a
978-981-16-9139-3
050
4
$a
QA76.9.A25
050
4
$a
JC596-596.2
072
7
$a
URD
$2
bicssc
072
7
$a
COM060040
$2
bisacsh
072
7
$a
URD
$2
thema
082
0 4
$a
005.8
$2
23
082
0 4
$a
323.448
$2
23
100
1
$a
Li, Jin.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1211623
245
1 0
$a
Privacy-Preserving Machine Learning
$h
[electronic resource] /
$c
by Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
VIII, 88 p. 21 illus., 18 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
SpringerBriefs on Cyber Security Systems and Networks,
$x
2522-557X
505
0
$a
Introduction -- Secure Cooperative Learning in Early Years -- Outsourced Computation for Learning -- Secure Distributed Learning -- Learning with Differential Privacy -- Applications - Privacy-Preserving Image Processing -- Threats in Open Environment -- Conclusion.
520
$a
This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.
650
0
$a
Data protection—Law and legislation.
$3
1366218
650
0
$a
Machine learning.
$3
561253
650
1 4
$a
Privacy.
$3
575491
650
2 4
$a
Machine Learning.
$3
1137723
700
1
$a
Li, Ping.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
884107
700
1
$a
Liu, Zheli.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1227999
700
1
$a
Chen, Xiaofeng.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
815875
700
1
$a
Li, Tong.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1397869
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811691386
776
0 8
$i
Printed edition:
$z
9789811691409
830
0
$a
SpringerBriefs on Cyber Security Systems and Networks,
$x
2522-5561
$3
1280044
856
4 0
$u
https://doi.org/10.1007/978-981-16-9139-3
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login