Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a…mehr
This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Jin Li is currently a professor and the vice dean of the Institute of Artificial Intelligence and Blockchain, Guangzhou University. He received his B.S. (2002) and M.S. (2004) from Southwest University and Sun Yat-sen University, both in Mathematics. He got his Ph.D. degree in information security from Sun Yat-sen University at 2007. His research interests include design of secure protocols in artificial intelligence, cloud computing (secure cloud storage and outsourcing computation), and cryptographic protocols. He served as a senior research associate at Korea Advanced Institute of Technology (Korea) and Illinois Institute of Technology (USA) from 2008 to 2010, respectively. He has published more than 100 papers in international conferences and journals, including IEEE INFOCOM, IEEE TIFS, IEEE TPDS, IEEE TOC, and ESORICS, etc. His work has been cited more than 11000 times at Google Scholar and the H-Index is 40. He served as an associate editor for several international journals, including IEEE Transactions on Dependable and Secure Computing, Information Sciences. He also served as the program chairs in the committee for many international conferences such as CSS 2019, ICA3PP 2018, CSE 2017, IEEE EUC 2017, and ISICA 2015. He received several National Science Foundation of China (NSFC) Grants, including NSFC Outstanding Youth Foundation.
Ping Li was born in May 1985 in Baojing Country of Hunan Province. She received her Ph.D. in School of Mathematics at Sun Yat-Sen University in June 2016 (Supervisor Prof. Zheng-An Yao) and joined the Guangzhou University as a postdoctoral fellow from July 2016 to December 2018 (Co-Supervisor Prof. Jin Li). Currently, she works at South China Normal University (Youth Talent). Her research fields are applied cryptography, cloud computing security, and privacy-preserving machine learning. Her current research direction contains cryptographic technologies, storage security and computation security in cloudcomputing, machine learning in securely outsourced computation, etc. She has published or accepted 20 academic papers, including 14 SCI papers and two ESI highly cited papers. She is undertaking the Youth Project of National Natural Science Foundation of China.
Zheli Liu received the B.Sc. and M.Sc. degrees in computer science from Jilin University, China, in 2002 and 2005, respectively. He received the Ph.D. degree in computer application from Jilin University in 2009. After a postdoctoral fellowship in Nankai University, he joined the College of Cyber Science of Nankai University in 2011. Currently, he works at Nankai University as an associate professor. His current research interests include applied cryptography and data privacy protection.
Xiaofeng Chen received his B.S. and M.S. in Mathematics from Northwest University, China, in 1998 and 2000, respectively. He got his Ph.D. degree in Cryptography from Xidian University in 2003. Currently, he works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 100 research papers in refereed international conferences and journals. His work has been cited more than 4000 times at Google Scholar. He is in the Editorial Board of IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Security and Communication Networks (SCN), and Computing and Informatics (CAI), etc. He has served as the program/general chair or program committee member in over 30 international conferences.
Tong Li received his B.S. and M.S. from Taiyuan University of Technology and Beijing University of Technology, in 2011 and 2014, respectively, both in Computer Science & Technology. He got his Ph.D. degree in information security from Nankai University at 2017. After a postdoctoral fellowship in Guangzhou University, he currently is an associate professor in Nankai University. His research interests include applied cryptography and data privacy protection in cloud computing.
Inhaltsangabe
Introduction.- Secure Cooperative Learning in Early Years.- Outsourced Computation for Learning.- Secure Distributed Learning.- Learning with Differential Privacy.- Applications - Privacy-Preserving Image Processing.- Threats in Open Environment.- Conclusion.
Introduction.- Secure Cooperative Learning in Early Years.- Outsourced Computation for Learning.- Secure Distributed Learning.- Learning with Differential Privacy.- Applications - Privacy-Preserving Image Processing.- Threats in Open Environment.- Conclusion.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826