|
|
|
|
LEADER |
03788nam a22005415i 4500 |
001 |
978-3-319-62004-6 |
003 |
DE-He213 |
005 |
20170822154742.0 |
007 |
cr nn 008mamaa |
008 |
170822s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319620046
|9 978-3-319-62004-6
|
024 |
7 |
|
|a 10.1007/978-3-319-62004-6
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D343
|
072 |
|
7 |
|a UNF
|2 bicssc
|
072 |
|
7 |
|a UYQE
|2 bicssc
|
072 |
|
7 |
|a COM021030
|2 bisacsh
|
082 |
0 |
4 |
|a 006.312
|2 23
|
100 |
1 |
|
|a Zhu, Tianqing.
|e author.
|
245 |
1 |
0 |
|a Differential Privacy and Applications
|h [electronic resource] /
|c by Tianqing Zhu, Gang Li, Wanlei Zhou, Philip S. Yu.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XIII, 235 p. 71 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 1568-2633 ;
|v 69
|
505 |
0 |
|
|a Preliminary of Differential Privacy -- Differentially Private Data Publishing: Settings and Mechanisms -- Differentially Private Data Publishing: Interactive Setting -- Differentially Private Data Publishing: Non-interactive Setting -- Differentially Private Data Analysis -- Differentially Private Deep Learning -- Differentially Private Applications: Where to Start? -- Differentially Private Social Network Data Publishing -- Differentially Private Recommender System -- Privacy Preserving for Tagging Recommender Systems -- Differential Location Privacy -- Differentially Private Spatial Crowdsourcing -- Correlated Differential Privacy for Non-IID Datasets -- Future Directions.
|
520 |
|
|
|a This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications. Early chapters are focused on two major directions, differentially private data publishing and differentially private data analysis. Data publishing focuses on how to modify the original dataset or the queries with the guarantee of differential privacy. Privacy data analysis concentrates on how to modify the data analysis algorithm to satisfy differential privacy, while retaining a high mining accuracy. The authors also introduce several applications in real world applications, including recommender systems and location privacy Advanced level students in computer science and engineering, as well as researchers and professionals working in privacy preserving, data mining, machine learning and data analysis will find this book useful as a reference. Engineers in database, network security, social networks and web services will also find this book useful.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Privacy.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
700 |
1 |
|
|a Li, Gang.
|e author.
|0 (orcid)http://orcid.org/0000-0003-1583-641X
|
700 |
1 |
|
|a Zhou, Wanlei.
|e author.
|
700 |
1 |
|
|a Yu, Philip S.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319620022
|
830 |
|
0 |
|a Advances in Information Security,
|x 1568-2633 ;
|v 69
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-62004-6
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|