000 | 03296nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-981-16-9139-3 | ||
003 | DE-He213 | ||
005 | 20240423130058.0 | ||
007 | cr nn 008mamaa | ||
008 | 220314s2022 si | s |||| 0|eng d | ||
020 |
_a9789811691393 _9978-981-16-9139-3 |
||
024 | 7 |
_a10.1007/978-981-16-9139-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
050 | 4 | _aJC596-596.2 | |
072 | 7 |
_aURD _2bicssc |
|
072 | 7 |
_aCOM060040 _2bisacsh |
|
072 | 7 |
_aURD _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
082 | 0 | 4 |
_a323.448 _223 |
100 | 1 |
_aLi, Jin. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aPrivacy-Preserving Machine Learning _h[electronic resource] / _cby Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2022. |
|
300 |
_aVIII, 88 p. 21 illus., 18 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs on Cyber Security Systems and Networks, _x2522-557X |
|
505 | 0 | _aIntroduction -- Secure Cooperative Learning in Early Years -- Outsourced Computation for Learning -- Secure Distributed Learning -- Learning with Differential Privacy -- Applications - Privacy-Preserving Image Processing -- Threats in Open Environment -- Conclusion. | |
520 | _aThis book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face. | ||
650 | 0 |
_aData protection _xLaw and legislation. |
|
650 | 0 | _aMachine learning. | |
650 | 1 | 4 | _aPrivacy. |
650 | 2 | 4 | _aMachine Learning. |
700 | 1 |
_aLi, Ping. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aLiu, Zheli. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aChen, Xiaofeng. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aLi, Tong. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811691386 |
776 | 0 | 8 |
_iPrinted edition: _z9789811691409 |
830 | 0 |
_aSpringerBriefs on Cyber Security Systems and Networks, _x2522-557X |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-16-9139-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c184803 _d184803 |