Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Differential privacy and applications
~
SpringerLink (Online service)
Differential privacy and applications
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Differential privacy and applications/ by Tianqing Zhu ... [et al.].
other author:
Zhu, Tianqing.
Published:
Cham :Springer International Publishing : : 2017.,
Description:
xiii, 235 p. :ill., digital ; : 24 cm.;
Contained By:
Springer eBooks
Subject:
Computer security. -
Online resource:
http://dx.doi.org/10.1007/978-3-319-62004-6
ISBN:
9783319620046
Differential privacy and applications
Differential privacy and applications
[electronic resource] /by Tianqing Zhu ... [et al.]. - Cham :Springer International Publishing :2017. - xiii, 235 p. :ill., digital ;24 cm. - Advances in information security,v.691568-2633 ;. - Advances in information security ;50..
Preliminary of Differential Privacy -- Differentially Private Data Publishing: Settings and Mechanisms -- Differentially Private Data Publishing: Interactive Setting -- Differentially Private Data Publishing: Non-interactive Setting -- Differentially Private Data Analysis -- Differentially Private Deep Learning -- Differentially Private Applications: Where to Start? -- Differentially Private Social Network Data Publishing -- Differentially Private Recommender System -- Privacy Preserving for Tagging Recommender Systems -- Differential Location Privacy -- Differentially Private Spatial Crowdsourcing -- Correlated Differential Privacy for Non-IID Datasets -- Future Directions.
This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications. Early chapters are focused on two major directions, differentially private data publishing and differentially private data analysis. Data publishing focuses on how to modify the original dataset or the queries with the guarantee of differential privacy. Privacy data analysis concentrates on how to modify the data analysis algorithm to satisfy differential privacy, while retaining a high mining accuracy. The authors also introduce several applications in real world applications, including recommender systems and location privacy Advanced level students in computer science and engineering, as well as researchers and professionals working in privacy preserving, data mining, machine learning and data analysis will find this book useful as a reference. Engineers in database, network security, social networks and web services will also find this book useful.
ISBN: 9783319620046
Standard No.: 10.1007/978-3-319-62004-6doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Differential privacy and applications
LDR
:02914nam a2200337 a 4500
001
923455
003
DE-He213
005
20180314142131.0
006
m d
007
cr nn 008maaau
008
190625s2017 gw s 0 eng d
020
$a
9783319620046
$q
(electronic bk.)
020
$a
9783319620022
$q
(paper)
024
7
$a
10.1007/978-3-319-62004-6
$2
doi
035
$a
978-3-319-62004-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UNF
$2
bicssc
072
7
$a
UYQE
$2
bicssc
072
7
$a
COM021030
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
Z63 2017
245
1 0
$a
Differential privacy and applications
$h
[electronic resource] /
$c
by Tianqing Zhu ... [et al.].
260
$a
Cham :
$c
2017.
$b
Springer International Publishing :
$b
Imprint: Springer,
300
$a
xiii, 235 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in information security,
$x
1568-2633 ;
$v
v.69
505
0
$a
Preliminary of Differential Privacy -- Differentially Private Data Publishing: Settings and Mechanisms -- Differentially Private Data Publishing: Interactive Setting -- Differentially Private Data Publishing: Non-interactive Setting -- Differentially Private Data Analysis -- Differentially Private Deep Learning -- Differentially Private Applications: Where to Start? -- Differentially Private Social Network Data Publishing -- Differentially Private Recommender System -- Privacy Preserving for Tagging Recommender Systems -- Differential Location Privacy -- Differentially Private Spatial Crowdsourcing -- Correlated Differential Privacy for Non-IID Datasets -- Future Directions.
520
$a
This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications. Early chapters are focused on two major directions, differentially private data publishing and differentially private data analysis. Data publishing focuses on how to modify the original dataset or the queries with the guarantee of differential privacy. Privacy data analysis concentrates on how to modify the data analysis algorithm to satisfy differential privacy, while retaining a high mining accuracy. The authors also introduce several applications in real world applications, including recommender systems and location privacy Advanced level students in computer science and engineering, as well as researchers and professionals working in privacy preserving, data mining, machine learning and data analysis will find this book useful as a reference. Engineers in database, network security, social networks and web services will also find this book useful.
650
0
$a
Computer security.
$3
557122
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
1 4
$a
Computer Science.
$3
593922
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
677765
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Privacy.
$3
575491
650
2 4
$a
Artificial Intelligence (incl. Robotics)
$3
593924
700
1
$a
Zhu, Tianqing.
$3
1199827
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer eBooks
830
0
$a
Advances in information security ;
$v
50.
$3
881246
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-62004-6
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login