000 nam a22 7a 4500
999 _c29325
_d29325
008 190326b xxu||||| |||| 00| 0 eng d
020 _a9781627054935
_c(pbk)
082 _a005.80151
_bLIN
100 _aLi, Ninghui
245 _aDifferential privacy : from theory to practice
260 _aS.l. :
_bMorgan & Claypool Publishers ,
_c2017
300 _axiii, 124 p. :
_bill. ;
365 _aUSD
_b50.00
_d00
504 _a Includes index and bibliographical references.
520 _aOver the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing. The DP notion offers strong privacy guarantee and has been applied to many data analysis tasks. This Synthesis Lecture is the first of two volumes on differential privacy. This lecture differs from the existing books and surveys on differential privacy in that we take an approach balancing theory and practice. We focus on empirical accuracy performances of algorithms rather than asymptotic accuracy guarantees. At the same time, we try to explain why these algorithms have those empirical accuracy performances. We also take a balanced approach regarding the semantic meanings of differential privacy, explaining both its strong guarantees and its limitations. We start by inspecting the definition and basic properties of DP, and the main primitives for achieving DP. Then, we give a detailed discussion on the semantic privacy guarantee provided by DP and the caveats when applying DP. Next, we review the state of the art mechanisms for publishing histograms for low-dimensional datasets, mechanisms for conducting machine learning tasks such as classification, regression, and clustering, and mechanisms for publishing information to answer marginal queries for high-dimensional datasets. Finally, we explain the sparse vector technique, including the many errors that have been made in the literature using it. The planned Volume 2 will cover usage of DP in other settings, including high-dimensional datasets, graph datasets, local setting, location privacy, and so on. We will also discuss various relaxations of DP.
650 _aData mining
650 _aAlgorithms
650 _aConfidential communications
650 _aPrivacy
650 _aMathematical models
650 _aData protection
650 _aMicrocontrollers
650 _aEmbedded computer systems
700 _aLyu, Min
700 _aSu, Dong
700 _aYang, Weining
942 _2ddc
_cBK