Skip to main content

Privacy-Preserving Machine Learning

  • Book
  • © 2022

Overview

  • Offers a new research perspective on machine learning
  • Presents state-of-the-art techniques for privacy-preserving machine learning
  • Identifies potential security threats regarding machine learning-based applications

Part of the book series: SpringerBriefs on Cyber Security Systems and Networks (BRIEFSCSSN)

  • 3423 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (8 chapters)

Keywords

About this book

This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.

Authors and Affiliations

  • School of Computer Science and Cyber Engineering, Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, China

    Jin Li

  • School of Computer Science, South China Normal University, Guangzhou, China

    Ping Li

  • College of Cyber Science and College of Computer Science, Nankai University, Tianjin, China

    Zheli Liu, Tong Li

  • State Key Laboratory of Integrated Service Network, Xidian University, Xi’an, China

    Xiaofeng Chen

About the authors

Jin Li is currently a professor and the vice dean of the Institute of Artificial Intelligence and Blockchain, Guangzhou University. He received his B.S. (2002) and M.S. (2004) from Southwest University and Sun Yat-sen University, both in Mathematics. He got his Ph.D. degree in information security from Sun Yat-sen University at 2007. His research interests include design of secure protocols in artificial intelligence, cloud computing (secure cloud storage and outsourcing computation), and cryptographic protocols. He served as a senior research associate at Korea Advanced Institute of Technology (Korea) and Illinois Institute of Technology (USA) from 2008 to 2010, respectively. He has published more than 100 papers in international conferences and journals, including IEEE INFOCOM, IEEE TIFS, IEEE TPDS, IEEE TOC, and ESORICS, etc. His work has been cited more than 11000 times at Google Scholar and the H-Index is 40. He served as an associate editor for several international journals, including IEEE Transactions on Dependable and Secure Computing, Information Sciences. He also served as the program chairs in the committee for many international conferences such as CSS 2019, ICA3PP 2018, CSE 2017, IEEE EUC 2017, and ISICA 2015. He received several National Science Foundation of China (NSFC) Grants, including NSFC Outstanding Youth Foundation.

Ping Li was born in May 1985 in Baojing Country of Hunan Province. She received her Ph.D. in School of Mathematics at Sun Yat-Sen University in June 2016 (Supervisor Prof. Zheng-An Yao) and joined the Guangzhou University as a postdoctoral fellow from July 2016 to December 2018 (Co-Supervisor Prof. Jin Li). Currently, she works at South China Normal University (Youth Talent). Her research fields are applied cryptography, cloud computing security, and privacy-preserving machine learning. Her current research direction contains cryptographic technologies, storage security and computation security in cloudcomputing, machine learning in securely outsourced computation, etc. She has published or accepted 20 academic papers, including 14 SCI papers and two ESI highly cited papers. She is undertaking the Youth Project of National Natural Science Foundation of China.

Zheli Liu received the B.Sc. and M.Sc. degrees in computer science from Jilin University, China, in 2002 and 2005, respectively. He received the Ph.D. degree in computer application from Jilin University in 2009. After a postdoctoral fellowship in Nankai University, he joined the College of Cyber Science of Nankai University in 2011. Currently, he works at Nankai University as an associate professor. His current research interests include applied cryptography and data privacy protection.

Xiaofeng Chen received his B.S. and M.S. in Mathematics from Northwest University, China, in 1998 and 2000, respectively. He got his Ph.D. degree in Cryptography from Xidian University in 2003. Currently, he works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 100 research papers in refereed international conferences and journals. His work has been cited more than 4000 times at Google Scholar. He is in the Editorial Board of IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Security and Communication Networks (SCN), and Computing and Informatics (CAI), etc. He has served as the program/general chair or program committee member in over 30 international conferences.

Tong Li received his B.S. and M.S. from Taiyuan University of Technology and Beijing University of Technology, in 2011 and 2014, respectively, both in Computer Science & Technology. He got his Ph.D. degree in information security from Nankai University at 2017. After a postdoctoral fellowship in Guangzhou University, he currently is an associate professor in Nankai University. His research interests include applied cryptography and data privacy protection in cloud computing.

Bibliographic Information

  • Book Title: Privacy-Preserving Machine Learning

  • Authors: Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li

  • Series Title: SpringerBriefs on Cyber Security Systems and Networks

  • DOI: https://doi.org/10.1007/978-981-16-9139-3

  • Publisher: Springer Singapore

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022

  • Softcover ISBN: 978-981-16-9138-6Published: 15 March 2022

  • eBook ISBN: 978-981-16-9139-3Published: 14 March 2022

  • Series ISSN: 2522-5561

  • Series E-ISSN: 2522-557X

  • Edition Number: 1

  • Number of Pages: VIII, 88

  • Number of Illustrations: 3 b/w illustrations, 18 illustrations in colour

  • Topics: Privacy, Machine Learning

Publish with us