Differential Privacy and Applications Differential Privacy and Applications
Advances in Information Security

Differential Privacy and Applications

Tianqing Zhu and Others
    • £104.99
    • £104.99

Publisher Description

This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications.

Early chapters are focused on two major directions, differentially private data publishing and differentially private data analysis. Data publishing focuses on how to modify the original dataset or the queries with the guarantee of differential privacy. Privacy data analysis concentrates on how to modify the data analysis algorithm to satisfy differential privacy, while retaining a high mining accuracy. The authors also introduce several applications in real world applications, including recommender systems and location privacy
Advanced level students in computer science and engineering, as well as researchers and professionals working in privacy preserving, data mining, machine learning and data analysis will find this book useful as a reference. Engineers in database, network security, social networks and web services will also find this book useful.

GENRE
Computing & Internet
RELEASED
2017
22 August
LANGUAGE
EN
English
LENGTH
248
Pages
PUBLISHER
Springer International Publishing
SIZE
4
MB

More Books Like This

Privacy and Anonymity in Information Management Systems Privacy and Anonymity in Information Management Systems
2010
Privacy in Statistical Databases Privacy in Statistical Databases
2016
Data and Applications Security and Privacy XXXV Data and Applications Security and Privacy XXXV
2021
Computational Data and Social Networks Computational Data and Social Networks
2021
Applications and Techniques in Information Security Applications and Techniques in Information Security
2018
Mobile Multimedia Communications Mobile Multimedia Communications
2021

More Books by Tianqing Zhu, Gang Li, Wanlei Zhou & Philip S. Yu

Other Books in This Series

Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber Denial, Deception and Counter Deception Cyber Denial, Deception and Counter Deception
2015
Insider Attack and Cyber Security Insider Attack and Cyber Security
2008
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024