Privacy-Preserving Machine Learning - Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li

Privacy-Preserving Machine Learning (eBook)

eBook Download: PDF
2022 | 1st ed. 2022
VIII, 88 Seiten
Springer Singapore (Verlag)
978-981-16-9139-3 (ISBN)
Systemvoraussetzungen
58,84 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.



Jin Li is currently a professor and the vice dean of the Institute of Artificial Intelligence and Blockchain, Guangzhou University. He received his B.S. (2002) and M.S. (2004) from Southwest University and Sun Yat-sen University, both in Mathematics. He got his Ph.D. degree in information security from Sun Yat-sen University at 2007. His research interests include design of secure protocols in artificial intelligence, cloud computing (secure cloud storage and outsourcing computation), and cryptographic protocols. He served as a senior research associate at Korea Advanced Institute of Technology (Korea) and Illinois Institute of Technology (USA) from 2008 to 2010, respectively. He has published more than 100 papers in international conferences and journals, including IEEE INFOCOM, IEEE TIFS, IEEE TPDS, IEEE TOC, and ESORICS, etc. His work has been cited more than 11000 times at Google Scholar and the H-Index is 40. He served as an associate editor for several international journals, including IEEE Transactions on Dependable and Secure Computing, Information Sciences. He also served as the program chairs in the committee for many international conferences such as CSS 2019, ICA3PP 2018, CSE 2017, IEEE EUC 2017, and ISICA 2015. He received several National Science Foundation of China (NSFC) Grants, including NSFC Outstanding Youth Foundation.

Ping Li was born in May 1985 in Baojing Country of Hunan Province. She received her Ph.D. in School of Mathematics at Sun Yat-Sen University in June 2016 (Supervisor Prof. Zheng-An Yao) and joined the Guangzhou University as a postdoctoral fellow from July 2016 to December 2018 (Co-Supervisor Prof. Jin Li). Currently, she works at South China Normal University (Youth Talent). Her research fields are applied cryptography, cloud computing security, and privacy-preserving machine learning. Her current research direction contains cryptographic technologies, storage security and computation security in cloud computing, machine learning in securely outsourced computation, etc. She has published or accepted 20 academic papers, including 14 SCI papers and two ESI highly cited papers. She is undertaking the Youth Project of National Natural Science Foundation of China.

Zheli Liu received the B.Sc. and M.Sc. degrees in computer science from Jilin University, China, in 2002 and 2005, respectively. He received the Ph.D. degree in computer application from Jilin University in 2009. After a postdoctoral fellowship in Nankai University, he joined the College of Cyber Science of Nankai University in 2011. Currently, he works at Nankai University as an associate professor. His current research interests include applied cryptography and data privacy protection.

Xiaofeng Chen received his B.S. and M.S. in Mathematics from Northwest University, China, in 1998 and 2000, respectively. He got his Ph.D. degree in Cryptography from Xidian University in 2003. Currently, he works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 100 research papers in refereed international conferences and journals. His work has been cited more than 4000 times at Google Scholar. He is in the Editorial Board of IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Security and Communication Networks (SCN), and Computing and Informatics (CAI), etc. He has served as the program/general chair or program committee member in over 30 international conferences.

Tong Li received his B.S. and M.S. from Taiyuan University of Technology and Beijing University of Technology, in 2011 and 2014, respectively, both in Computer Science & Technology. He got his Ph.D. degree in information security from Nankai University at 2017. After a postdoctoral fellowship in Guangzhou University, he currently is an associate professor in Nankai University. His research interests include applied cryptography and data privacy protection in cloud computing.


This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.
Erscheint lt. Verlag 14.3.2022
Reihe/Serie SpringerBriefs on Cyber Security Systems and Networks
SpringerBriefs on Cyber Security Systems and Networks
Zusatzinfo VIII, 88 p. 21 illus., 18 illus. in color.
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Schlagworte Artificial Intelligence • data encryption • machine learning • neural network • Privacy-preserving Technique • secure computation
ISBN-10 981-16-9139-8 / 9811691398
ISBN-13 978-981-16-9139-3 / 9789811691393
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 2,0 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
79,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
42,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90