Differential privacy : from theory to practice (Record no. 29325)

000 -LEADER
fixed length control field nam a22 7a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190326b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627054935
Terms of availability (pbk)
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.80151
Item number LIN
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Li, Ninghui
245 ## - TITLE STATEMENT
Title Differential privacy : from theory to practice
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc S.l. :
Name of publisher, distributor, etc Morgan & Claypool Publishers ,
Date of publication, distribution, etc 2017
300 ## - PHYSICAL DESCRIPTION
Extent xiii, 124 p. :
Other physical details ill. ;
365 ## - TRADE PRICE
Price type code USD
Price amount 50.00
Unit of pricing 00
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes index and bibliographical references.
520 ## - SUMMARY, ETC.
Summary, etc Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing. The DP notion offers strong privacy guarantee and has been applied to many data analysis tasks. This Synthesis Lecture is the first of two volumes on differential privacy. This lecture differs from the existing books and surveys on differential privacy in that we take an approach balancing theory and practice. We focus on empirical accuracy performances of algorithms rather than asymptotic accuracy guarantees. At the same time, we try to explain why these algorithms have those empirical accuracy performances. We also take a balanced approach regarding the semantic meanings of differential privacy, explaining both its strong guarantees and its limitations. We start by inspecting the definition and basic properties of DP, and the main primitives for achieving DP. Then, we give a detailed discussion on the semantic privacy guarantee provided by DP and the caveats when applying DP. Next, we review the state of the art mechanisms for publishing histograms for low-dimensional datasets, mechanisms for conducting machine learning tasks such as classification, regression, and clustering, and mechanisms for publishing information to answer marginal queries for high-dimensional datasets. Finally, we explain the sparse vector technique, including the many errors that have been made in the literature using it. The planned Volume 2 will cover usage of DP in other settings, including high-dimensional datasets, graph datasets, local setting, location privacy, and so on. We will also discuss various relaxations of DP.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data mining
Topical term or geographic name as entry element Algorithms
Topical term or geographic name as entry element Confidential communications
Topical term or geographic name as entry element Privacy
Topical term or geographic name as entry element Mathematical models
Topical term or geographic name as entry element Data protection
Topical term or geographic name as entry element Microcontrollers
Topical term or geographic name as entry element Embedded computer systems
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Lyu, Min
Personal name Su, Dong
Personal name Yang, Weining
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Date last borrowed Koha item type
          DAIICT DAIICT 2019-03-26 Kushal Books 3740.00 2 005.80151 LIN 031832 2023-04-13 2023-04-03 Books

Powered by Koha