Differential Privacy and Applications Differential Privacy and Applications
Advances in Information Security

Differential Privacy and Applications

Tianqing Zhu والمزيد
    • ‏129٫99 US$
    • ‏129٫99 US$

وصف الناشر

This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications.

Early chapters are focused on two major directions, differentially private data publishing and differentially private data analysis. Data publishing focuses on how to modify the original dataset or the queries with the guarantee of differential privacy. Privacy data analysis concentrates on how to modify the data analysis algorithm to satisfy differential privacy, while retaining a high mining accuracy. The authors also introduce several applications in real world applications, including recommender systems and location privacy
Advanced level students in computer science and engineering, as well as researchers and professionals working in privacy preserving, data mining, machine learning and data analysis will find this book useful as a reference. Engineers in database, network security, social networks and web services will also find this book useful.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠١٧
٢٢ أغسطس
اللغة
EN
الإنجليزية
عدد الصفحات
٢٤٨
الناشر
Springer International Publishing
البائع
Springer Nature B.V.
الحجم
٤
‫م.ب.‬
Privacy and Anonymity in Information Management Systems Privacy and Anonymity in Information Management Systems
٢٠١٠
Privacy in Statistical Databases Privacy in Statistical Databases
٢٠١٦
Data and Applications Security and Privacy XXXV Data and Applications Security and Privacy XXXV
٢٠٢١
Computational Data and Social Networks Computational Data and Social Networks
٢٠٢١
Applications and Techniques in Information Security Applications and Techniques in Information Security
٢٠١٨
Mobile Multimedia Communications Mobile Multimedia Communications
٢٠٢١
Knowledge Science, Engineering and Management Knowledge Science, Engineering and Management
٢٠٢٥
Knowledge Science, Engineering and Management Knowledge Science, Engineering and Management
٢٠٢٥
Knowledge Science, Engineering and Management Knowledge Science, Engineering and Management
٢٠٢٥
Knowledge Science, Engineering and Management Knowledge Science, Engineering and Management
٢٠٢٥
Knowledge Science, Engineering and Management Knowledge Science, Engineering and Management
٢٠٢٥
Knowledge Science, Engineering and Management Knowledge Science, Engineering and Management
٢٠٢٥
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
٢٠٠٩
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
٢٠١٦
Security for Telecommunications Networks Security for Telecommunications Networks
٢٠٠٨
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
٢٠٠٧
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
٢٠١٥
Network Security Policies and Procedures Network Security Policies and Procedures
٢٠٠٧