Privacy-preserving machine learning / (Record no. 13900)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01983cam a2200265Ii 4500 |
INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789811691386 |
INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789811691386 |
DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | Q325.5 .P56 2022 |
Item number | 3 |
MAIN ENTRY--AUTHOR NAME | |
Personal name | Li, Jin, |
TITLE STATEMENT | |
Title | Privacy-preserving machine learning / |
Statement of responsibility, etc | Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li |
Copyright Date | |
Place of publication | Singapore : |
Name of publisher | Springer, |
Year of publication or production | 2022 |
PHYSICAL DESCRIPTION | |
Number of Pages | viii, 88 pages |
Other physical details | illustrations |
SERIES STATEMENT | |
Series statement | SpringerBriefs on cyber security systems and networks, |
FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction -- Secure Cooperative Learning in Early Years -- Outsourced Computation for Learning -- Secure Distributed Learning -- Learning with Differential Privacy -- Applications - Privacy-Preserving Image Processing -- Threats in Open Environment -- Conclusion |
SUMMARY, ETC. | |
Summary, etc | This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Machine learning |
ADDED ENTRY--PERSONAL NAME | |
Personal name | Li, Ping, |
ADDED ENTRY--PERSONAL NAME | |
Personal name | Liu, Zheli, |
ADDED ENTRY--PERSONAL NAME | |
Personal name | Chen, Xiaofeng, |
ADDED ENTRY--PERSONAL NAME | |
Personal name | Li, Tong, |
ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://rave.ohiolink.edu/ebooks/ebc2/9789811691393 |
ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://link.springer.com/10.1007/978-981-16-9139-3 |
ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://go.ohiolink.edu/goto?url=https://link.springer.com/10.1007/978-981-16-9139-3 |
ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Permanent Location | Current Location | Date acquired | Full call number | Accession Number | Koha item type |
---|---|---|---|---|---|
Gabriel Afolabi Ojo Central Library (Headquarters). | Gabriel Afolabi Ojo Central Library (Headquarters). | 11/05/2024 | Q325.5 .P56 2022 | 0194798 | Books |
Gabriel Afolabi Ojo Central Library (Headquarters). | Gabriel Afolabi Ojo Central Library (Headquarters). | 11/05/2024 | Q325.5 .P56 2022 | 0194797 | Books |
Gabriel Afolabi Ojo Central Library (Headquarters). | Gabriel Afolabi Ojo Central Library (Headquarters). | 11/05/2024 | Q325.5 .P56 2022 | 0195340 | Books |