Differential Privacy and Applications Differential Privacy and Applications
Advances in Information Security

Differential Privacy and Applications

Tianqing Zhu and Others
    • 119,99 €
    • 119,99 €

Publisher Description

This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications.

Early chapters are focused on two major directions, differentially private data publishing and differentially private data analysis. Data publishing focuses on how to modify the original dataset or the queries with the guarantee of differential privacy. Privacy data analysis concentrates on how to modify the data analysis algorithm to satisfy differential privacy, while retaining a high mining accuracy. The authors also introduce several applications in real world applications, including recommender systems and location privacy
Advanced level students in computer science and engineering, as well as researchers and professionals working in privacy preserving, data mining, machine learning and data analysis will find this book useful as a reference. Engineers in database, network security, social networks and web services will also find this book useful.

GENRE
Computing & Internet
RELEASED
2017
22 August
LANGUAGE
EN
English
LENGTH
248
Pages
PUBLISHER
Springer International Publishing
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
4
MB
Knowledge Science, Engineering and Management Knowledge Science, Engineering and Management
2025
Knowledge Science, Engineering and Management Knowledge Science, Engineering and Management
2025
Knowledge Science, Engineering and Management Knowledge Science, Engineering and Management
2025
Knowledge Science, Engineering and Management Knowledge Science, Engineering and Management
2025
Knowledge Science, Engineering and Management Knowledge Science, Engineering and Management
2025
Knowledge Science, Engineering and Management Knowledge Science, Engineering and Management
2025
Cyber Threat Intelligence Cyber Threat Intelligence
2018
Smart Micro-Grid Systems Security and Privacy Smart Micro-Grid Systems Security and Privacy
2018
Versatile Cybersecurity Versatile Cybersecurity
2018
Malicious Attack Propagation and Source Identification Malicious Attack Propagation and Source Identification
2018
Cryptography Arithmetic Cryptography Arithmetic
2020
Binary Code Fingerprinting for Cybersecurity Binary Code Fingerprinting for Cybersecurity
2020