Privacy-Preserving Machine Learning [electronic resource] by Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li.

This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now availab...

Full description

Bibliographic Details
Uniform Title:SpringerBriefs on Cyber Security Systems and Networks, 2522-557X
Main Authors: Li, Jin (Author)
Li, Ping (Author)
Liu, Zheli (Author)
Chen, Xiaofeng (Author)
Li, Tong (Author)
Corporate Author: SpringerLink (Online service)
Language:English
Published: Singapore : Springer Nature Singapore : Imprint: Springer, 2022.
Edition:1st ed. 2022.
Series:SpringerBriefs on Cyber Security Systems and Networks,
Subjects:
Online Access:
Format: Electronic eBook

MARC

LEADER 00000nam a22000003i 4500
001 ebs31036486e
003 EBZ
006 m o d ||||||
007 cr|unu||||||||
008 220314s2022 si | o |||| 0|eng d
020 |z 9789811691386 
020 |a 9789811691393 (online) 
035 |a (EBZ)ebs31036486e 
040 |d EBZ 
042 |a msc 
050 4 |a QA76.9.A25 
050 4 |a JC596-596.2 
100 1 |a Li, Jin.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Privacy-Preserving Machine Learning  |h [electronic resource]  |c by Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li. 
250 |a 1st ed. 2022. 
264 1 |a Singapore :  |b Springer Nature Singapore :  |b Imprint: Springer,  |c 2022. 
490 1 |a SpringerBriefs on Cyber Security Systems and Networks,  |x 2522-557X 
505 0 |a Introduction -- Secure Cooperative Learning in Early Years -- Outsourced Computation for Learning -- Secure Distributed Learning -- Learning with Differential Privacy -- Applications - Privacy-Preserving Image Processing -- Threats in Open Environment -- Conclusion. 
520 |a This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face. 
650 0 |a Data protection—Law and legislation. 
650 0 |a Machine learning. 
700 1 |a Li, Ping.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Liu, Zheli.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Chen, Xiaofeng.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Li, Tong.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Computer Science eBooks 2022 English/International   |d Springer Nature 
776 0 8 |i Printed edition:  |z 9789811691386 
776 0 8 |i Printed edition:  |z 9789811691409 
776 1 |t Privacy-Preserving Machine Learning 
830 0 |a SpringerBriefs on Cyber Security Systems and Networks,  |x 2522-557X 
856 4 0 |y Access Content Online(from Springer Computer Science eBooks 2022 English/International)  |u https://ezproxy.msu.edu/login?url=https://link.springer.com/10.1007/978-981-16-9139-3  |z Springer Computer Science eBooks 2022 English/International: 2022