Atnaujinkite slapukų nuostatas

El. knyga: Privacy-Preserving Machine Learning

Kitos knygos pagal šią temą:
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.

1 Introduction
1(14)
1.1 What Is Machine Learning?
1(3)
1.2 Why Machine Learning Needs Privacy-Preserving Manner
4(3)
1.3 Security Threats
7(2)
1.4 Bibliographic Notes
9(6)
References
11(4)
2 Secure Cooperative Learning in Early Years
15(16)
2.1 An Overview of Neural Network
15(2)
2.2 Back-Propagation Learning
17(3)
2.3 Vertically Partitioned Training Dataset
20(5)
2.3.1 Privacy-Preserving Two-Party Training
20(1)
2.3.2 Secure Manner
21(1)
2.3.3 Scheme Details
21(3)
2.3.4 Analysis of Security and Accuracy Loss
24(1)
2.4 Arbitrarily Partitioned Training Dataset
25(6)
2.4.1 BGN Homomorphic Encryption
26(1)
2.4.2 Overviews
26(1)
2.4.3 Scheme Details
27(3)
References
30(1)
3 Outsourced Computation for Learning
31(16)
3.1 Outsourced Computation
31(1)
3.2 Multi-key Privacy-Preserving Deep Learning
32(15)
3.2.1 Deep Learning
32(3)
3.2.2 Homomorphic Encryption with Double Decryption Mechanism
35(2)
3.2.3 Basic Scheme
37(2)
3.2.4 Advance Scheme
39(4)
3.2.5 Security Analysis
43(2)
References
45(2)
4 Secure Distributed Learning
47(10)
4.1 Distributed Privacy-Preserving Deep Learning
47(4)
4.1.1 Distributed Selective SGD
48(1)
4.1.2 Scheme Details
49(2)
4.2 Secure Aggregation for Deep Learning
51(6)
4.2.1 Secure Manner
52(1)
4.2.2 Technical Intuition
53(1)
4.2.3 Secure Protocol
54(2)
References
56(1)
5 Learning with Differential Privacy
57(8)
5.1 Differential Privacy
57(3)
5.1.1 Definition
57(1)
5.1.2 Privacy Mechanism
58(2)
5.2 Deep Learning with Differential Privacy
60(2)
5.2.1 Differentially Private SGD Algorithm
60(1)
5.2.2 Privacy Account
61(1)
5.3 Distributed Deep Learning with Differential Privacy
62(3)
5.3.1 Private Algorithm
62(1)
5.3.2 Estimating Sensitivity
63(1)
References
64(1)
6 Applications---Privacy-Preserving Image Processing
65(10)
6.1 Machine Learning Image Processing for Privacy Protection
65(1)
6.2 Feature Extraction Methods of Machine Learning Image Processing
66(1)
6.3 Main Models of Machine Learning Image Processing for Privacy Protection
67(8)
6.3.1 Privacy-Preserving Face Recognition
68(2)
6.3.2 Privacy-Preserving Object Recognition
70(2)
6.3.3 Privacy-Preserving Classification
72(2)
Reference
74(1)
7 Threats in Open Environment
75(12)
7.1 Data Reconstruction Attack
75(4)
7.1.1 Threat Model
76(1)
7.1.2 Attack Method
77(2)
7.2 Membership Inference Attack
79(4)
7.2.1 Threat Model
79(1)
7.2.2 Attack Method
80(3)
7.3 Model Stealing Attack
83(4)
7.3.1 Threat Model
84(1)
7.3.2 Attack Method
85(1)
References
86(1)
8 Conclusion
87
Jin Li is currently a professor and the vice dean of the Institute of Artificial Intelligence and Blockchain, Guangzhou University. He received his B.S. (2002) and M.S. (2004) from Southwest University and Sun Yat-sen University, both in Mathematics. He got his Ph.D. degree in information security from Sun Yat-sen University at 2007. His research interests include design of secure protocols in artificial intelligence, cloud computing (secure cloud storage and outsourcing computation), and cryptographic protocols. He served as a senior research associate at Korea Advanced Institute of Technology (Korea) and Illinois Institute of Technology (USA) from 2008 to 2010, respectively. He has published more than 100 papers in international conferences and journals, including IEEE INFOCOM, IEEE TIFS, IEEE TPDS, IEEE TOC, and ESORICS, etc. His work has been cited more than 11000 times at Google Scholar and the H-Index is 40. He served as an associate editor for several international journals, including IEEE Transactions on Dependable and Secure Computing, Information Sciences. He also served as the program chairs in the committee for many international conferences such as CSS 2019, ICA3PP 2018, CSE 2017, IEEE EUC 2017, and ISICA 2015. He received several National Science Foundation of China (NSFC) Grants, including NSFC Outstanding Youth Foundation.





Ping Li was born in May 1985 in Baojing Country of Hunan Province. She received her Ph.D. in School of Mathematics at Sun Yat-Sen University in June 2016 (Supervisor Prof. Zheng-An Yao) and joined the Guangzhou University as a postdoctoral fellow from July 2016 to December 2018 (Co-Supervisor Prof. Jin Li. Currently, she works at South China Normal University (Youth Talent). Her research fields are applied cryptography, cloud computing security, and privacy-preserving machine learning. Her current research direction contains cryptographic technologies, storage security and computation security in cloudcomputing, machine learning in securely outsourced computation, etc. She has published or accepted 20 academic papers, including 14 SCI papers and two ESI highly cited papers. She is undertaking the Youth Project of National Natural Science Foundation of China.





Zheli Liu received the B.Sc. and M.Sc. degrees in computer science from Jilin University, China, in 2002 and 2005, respectively. He received the Ph.D. degree in computer application from Jilin University in 2009. After a postdoctoral fellowship in Nankai University, he joined the College of Cyber Science of Nankai University in 2011. Currently, he works at Nankai University as an associate professor. His current research interests include applied cryptography and data privacy protection.





Xiaofeng Chen received his B.S. and M.S. in Mathematics from Northwest University, China, in 1998 and 2000, respectively. He got his Ph.D. degree in Cryptography from Xidian University in 2003. Currently, he works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 100 research papers in refereed international conferences and journals. His work has been cited more than 4000 times at Google Scholar. He is in the Editorial Board of IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Security and Communication Networks (SCN), and Computing and Informatics (CAI), etc. He has served as the program/general chair or program committee member in over 30 international conferences.





Tong Li received his B.S. and M.S. from Taiyuan University of Technology and Beijing University of Technology, in 2011 and 2014, respectively, both in Computer Science & Technology. He got his Ph.D. degree in information security from Nankai University at 2017. After a postdoctoral fellowship in Guangzhou University, he currently is an associate professor in Nankai University. His research interests include applied cryptography and data privacy protection in cloud computing.