Privacy-Preserving Machine Learning Privacy-Preserving Machine Learning
SpringerBriefs on Cyber Security Systems and Networks

Privacy-Preserving Machine Learning

Jin Li y otros
    • USD 49.99
    • USD 49.99

Descripción editorial

This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.

GÉNERO
Informática e Internet
PUBLICADO
2022
14 de marzo
IDIOMA
EN
Inglés
EXTENSIÓN
96
Páginas
EDITORIAL
Springer Nature Singapore
VENDEDOR
Springer Nature B.V.
TAMAÑO
8.9
MB
Algorithms and Architectures for Parallel Processing Algorithms and Architectures for Parallel Processing
2025
Algorithms and Architectures for Parallel Processing Algorithms and Architectures for Parallel Processing
2025
Algorithms and Architectures for Parallel Processing Algorithms and Architectures for Parallel Processing
2025
Algorithms and Architectures for Parallel Processing Algorithms and Architectures for Parallel Processing
2025
Algorithms and Architectures for Parallel Processing Algorithms and Architectures for Parallel Processing
2025
Algorithms and Architectures for Parallel Processing Algorithms and Architectures for Parallel Processing
2025
Privacy-Preserving Deep Learning Privacy-Preserving Deep Learning
2021
Design and Cryptanalysis of ZUC Design and Cryptanalysis of ZUC
2021
Cybersecurity in Digital Transformation Cybersecurity in Digital Transformation
2020
Location Privacy in Mobile Applications Location Privacy in Mobile Applications
2018
Big Digital Forensic Data Big Digital Forensic Data
2018
Advanced Monitoring in P2P Botnets Advanced Monitoring in P2P Botnets
2018