|
|
|
|
LEADER |
00000nam a22000003i 4500 |
001 |
ebs31036486e |
003 |
EBZ |
006 |
m o d |||||| |
007 |
cr|unu|||||||| |
008 |
220314s2022 si | o |||| 0|eng d |
020 |
|
|
|z 9789811691386
|
020 |
|
|
|a 9789811691393 (online)
|
035 |
|
|
|a (EBZ)ebs31036486e
|
040 |
|
|
|d EBZ
|
042 |
|
|
|a msc
|
050 |
|
4 |
|a QA76.9.A25
|
050 |
|
4 |
|a JC596-596.2
|
100 |
1 |
|
|a Li, Jin.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Privacy-Preserving Machine Learning
|h [electronic resource]
|c by Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li.
|
250 |
|
|
|a 1st ed. 2022.
|
264 |
|
1 |
|a Singapore :
|b Springer Nature Singapore :
|b Imprint: Springer,
|c 2022.
|
490 |
1 |
|
|a SpringerBriefs on Cyber Security Systems and Networks,
|x 2522-557X
|
505 |
0 |
|
|a Introduction -- Secure Cooperative Learning in Early Years -- Outsourced Computation for Learning -- Secure Distributed Learning -- Learning with Differential Privacy -- Applications - Privacy-Preserving Image Processing -- Threats in Open Environment -- Conclusion.
|
520 |
|
|
|a This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.
|
650 |
|
0 |
|a Data protection—Law and legislation.
|
650 |
|
0 |
|a Machine learning.
|
700 |
1 |
|
|a Li, Ping.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Liu, Zheli.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Chen, Xiaofeng.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Li, Tong.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Computer Science eBooks 2022 English/International
|d Springer Nature
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811691386
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811691409
|
776 |
1 |
|
|t Privacy-Preserving Machine Learning
|
830 |
|
0 |
|a SpringerBriefs on Cyber Security Systems and Networks,
|x 2522-557X
|
856 |
4 |
0 |
|y Access Content Online(from Springer Computer Science eBooks 2022 English/International)
|u https://ezproxy.msu.edu/login?url=https://link.springer.com/10.1007/978-981-16-9139-3
|z Springer Computer Science eBooks 2022 English/International: 2022
|