The Algorithmic Foundations of Differential Privacy 在線電子書 圖書標籤: 計算機 privacy Cynthia_Dwork
發表於2024-11-08
The Algorithmic Foundations of Differential Privacy 在線電子書 pdf 下載 txt下載 epub 下載 mobi 下載 2024
最好能夠對密碼學和AGT有一定瞭解,這樣能夠比較順暢地通讀全本(雖然能看齣老太太已經盡可能避免用密碼解決問題…
評分最好能夠對密碼學和AGT有一定瞭解,這樣能夠比較順暢地通讀全本(雖然能看齣老太太已經盡可能避免用密碼解決問題…
評分最好能夠對密碼學和AGT有一定瞭解,這樣能夠比較順暢地通讀全本(雖然能看齣老太太已經盡可能避免用密碼解決問題…
評分最好能夠對密碼學和AGT有一定瞭解,這樣能夠比較順暢地通讀全本(雖然能看齣老太太已經盡可能避免用密碼解決問題…
評分最好能夠對密碼學和AGT有一定瞭解,這樣能夠比較順暢地通讀全本(雖然能看齣老太太已經盡可能避免用密碼解決問題…
The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly detailed, and as technology enables ever more powerful collection and curation of these data, the need increases for a robust, meaningful, and mathematically rigorous definition of privacy, together with a computationally rich class of algorithms that satisfy this definition. Differential Privacy is such a definition. After motivating and discussing the meaning of differential privacy, the preponderance of this book is devoted to fundamental techniques for achieving differential privacy, and application of these techniques in creative combinations, using the query-release problem as an ongoing example. A key point is that, by rethinking the computational goal, one can often obtain far better results than would be achieved by methodically replacing each step of a non-private computation with a differentially private implementation. Despite some astonishingly powerful computational results, there are still fundamental limitations - not just on what can be achieved with differential privacy but on what can be achieved with any method that protects against a complete breakdown in privacy. Virtually all the algorithms discussed in this book maintain differential privacy against adversaries of arbitrary computational power. Certain algorithms are computationally intensive, others are efficient. Computational complexity for the adversary and the algorithm are both discussed. As the book progresses, it turns from fundamentals to applications other than query-release, discussing differentially private methods for mechanism design and machine learning. The vast majority of the literature on differentially private algorithms considers a single, static, database that is subject to many analyses. Differential privacy in other models, including distributed databases and computations on data streams is also discussed in the book.
評分
評分
評分
評分
The Algorithmic Foundations of Differential Privacy 在線電子書 pdf 下載 txt下載 epub 下載 mobi 下載 2024