語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Privacy-Preserving Machine Learning
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Privacy-Preserving Machine Learning/ by Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li.
作者:
Li, Jin.
其他作者:
Li, Tong.
面頁冊數:
VIII, 88 p. 21 illus., 18 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Machine Learning. -
電子資源:
https://doi.org/10.1007/978-981-16-9139-3
ISBN:
9789811691393
Privacy-Preserving Machine Learning
Li, Jin.
Privacy-Preserving Machine Learning
[electronic resource] /by Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li. - 1st ed. 2022. - VIII, 88 p. 21 illus., 18 illus. in color.online resource. - SpringerBriefs on Cyber Security Systems and Networks,2522-557X. - SpringerBriefs on Cyber Security Systems and Networks,.
Introduction -- Secure Cooperative Learning in Early Years -- Outsourced Computation for Learning -- Secure Distributed Learning -- Learning with Differential Privacy -- Applications - Privacy-Preserving Image Processing -- Threats in Open Environment -- Conclusion.
This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.
ISBN: 9789811691393
Standard No.: 10.1007/978-981-16-9139-3doiSubjects--Topical Terms:
1137723
Machine Learning.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Privacy-Preserving Machine Learning
LDR
:02547nam a22004215i 4500
001
1090453
003
DE-He213
005
20220510012303.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811691393
$9
978-981-16-9139-3
024
7
$a
10.1007/978-981-16-9139-3
$2
doi
035
$a
978-981-16-9139-3
050
4
$a
QA76.9.A25
050
4
$a
JC596-596.2
072
7
$a
URD
$2
bicssc
072
7
$a
COM060040
$2
bisacsh
072
7
$a
URD
$2
thema
082
0 4
$a
005.8
$2
23
082
0 4
$a
323.448
$2
23
100
1
$a
Li, Jin.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1211623
245
1 0
$a
Privacy-Preserving Machine Learning
$h
[electronic resource] /
$c
by Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
VIII, 88 p. 21 illus., 18 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
SpringerBriefs on Cyber Security Systems and Networks,
$x
2522-557X
505
0
$a
Introduction -- Secure Cooperative Learning in Early Years -- Outsourced Computation for Learning -- Secure Distributed Learning -- Learning with Differential Privacy -- Applications - Privacy-Preserving Image Processing -- Threats in Open Environment -- Conclusion.
520
$a
This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.
650
2 4
$a
Machine Learning.
$3
1137723
650
1 4
$a
Privacy.
$3
575491
650
0
$a
Machine learning.
$3
561253
650
0
$a
Data protection—Law and legislation.
$3
1366218
700
1
$a
Li, Tong.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1397869
700
1
$a
Chen, Xiaofeng.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
815875
700
1
$a
Liu, Zheli.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1227999
700
1
$a
Li, Ping.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
884107
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811691386
776
0 8
$i
Printed edition:
$z
9789811691409
830
0
$a
SpringerBriefs on Cyber Security Systems and Networks,
$x
2522-5561
$3
1280044
856
4 0
$u
https://doi.org/10.1007/978-981-16-9139-3
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入