02760nam 2200541Ia 450 991077792250332120230207230357.00-8261-1615-9(CKB)1000000000773414(EBL)445587(OCoLC)425960902(SSID)ssj0000247495(PQKBManifestationID)12094200(PQKBTitleCode)TC0000247495(PQKBWorkID)10199280(PQKB)11192788(MiAaPQ)EBC445587(Au-PeEL)EBL445587(CaPaEBR)ebr10309190(CaONFJC)MIL218585(EXLCZ)99100000000077341420081230d2009 uy 0engurcn|||||||||txtccrSocial insurance and social justice[electronic resource] social security, medicare, and the campaign against entitlements /Leah Rogne ... [et al.]New York, NY Springer Pub.c20091 online resource (484 p.)Description based upon print version of record.0-8261-1614-0 Includes bibliographical references and index.Contents; Contributors; Foreword; Acknowledgments; In Memoriam: Mr. Social Security: The Extraordinary Contributions of Robert M. Ball; Introduction: We're All in This Together; PART I: SOCIAL INSURANCE: HISTORY, POLITICS, AND PROSPECTS; PART II: WHAT'S AT STAKE; PART III: THE ONGOING DEBATES OVER SOCIAL INSURANCE PROGRAMS; PART IV: CRITICAL PERSPECTIVES ON SOCIAL INSURANCE REFORM; PART V: TEACHING SOCIAL INSURANCE: CRITICAL PEDAGOGY AND SOCIAL JUSTICE; Epilogue: From the Audacity of Hope to the Audacity of Action; Index""[W]e must tell the story of how social insurance programs have assured basic economic and health security for millions of Americans .This book is a must-read for anyone who cares about these goals."". -From the Foreword by Barbara Kennelly. President and CEO,. National Committee to Preserve Social Security and Medicare. This politically charged, provocative text serves as an introduction to social insurance programs, examining all aspects of these hotly debated policies. The editors cover cutting-edge topics, including Social Security and privatization, universal health insurance, and how AmSocial securityUnited StatesSocial justiceUnited StatesSocial securitySocial justice368.4/300973Rogne Leah1509692MiAaPQMiAaPQMiAaPQBOOK9910777922503321Social insurance and social justice3741776UNINA06822nam 22006135 450 991104781780332120250722130257.03-031-95052-610.1007/978-3-031-95052-0(CKB)39698541100041(MiAaPQ)EBC32227309(Au-PeEL)EBL32227309(DE-He213)978-3-031-95052-0(EXLCZ)993969854110004120250722d2026 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierPerturbation Based Privacy in Crowdsensing /by Zhirun Zheng, Zhetao Li, Xuemin Shen1st ed. 2026.Cham :Springer Nature Switzerland :Imprint: Springer,2026.1 online resource (264 pages)Wireless Networks,2366-14453-031-95051-8 Chapter 1 -- 1.1 An Overview of Crowdsensing -- 1.1.1 Evolutionary Path of Crowdsensing -- 1.1.2 Architecture and Characteristics of Crowdsensing -- 1.1.3 Applications of Crowdsensing -- 1.2 Privacy Challenges in Crowdsensing -- 1.2.1 Privacy Leakage -- 1.2.2 Data Privacy vs. Data Utility -- 1.2.3 Data Privacy vs. Data Poisoning -- 1.3 Aim and Organization of Monograph -- Chapter 2 Perturbation-based Privacy Preservation -- 2.1 Classical Privacy Notions -- 2.1.1 Differentially Privacy -- 2.1.2 Identifiability -- 2.1.3 Mutual-Information Privacy -- 2.2 Relations between Privacy Notions -- 2.2.1 Differentially Privacy vs. Identifiability -- 2.2.2 Differentially Privacy vs. Mutual-Information Privacy -- 2.2.3 Identifiability vs. Mutual-Information Privacy -- 2.3 Summary -- Chapter 3 Semantic-Aware Trajectory Privacy Preservation in Crowdsensing -- 3.1 Problem Statement and Basic Concepts -- 3.1.1 Problem Statement -- 3.1.2 Basic Concepts -- 3.2 Privacy and Utility Metrics -- 3.2.1 Data Privacy Metric -- 3.2.2 Semantic Privacy Metric -- 3.2.3 Semantic-Aware Trajectory Utility Metric -- 3.3 Semantic-Aware Privacy Mapping Mechanism -- 3.3.1 Constructing Optimization Model -- 3.3.2 Solving Optimization Model -- 3.3.3 Computational Complexity -- 3.4 Privacy Analysis -- 3.5 Performance Evaluation -- 3.5.1 Simulation Settings -- 3.5.2 Simulation Results -- 3.6 Summary and Further Reading -- Chapter 4 Pricing-Aware Location Privacy Preservation in Crowdsensing -- 4.1 Problem Statement and Basic Concepts -- 4.1.1 Problem Statement -- 4.1.2 Basic Concepts -- 4.2 Utility Loss Metrics 4 4.2.1 Adaptive Supply and Demand Aware Grid -- 4.2.2 Dynamic Pricing Utility Metric -- 4.2.3 Ride-Matching Utility Metric -- 4.3 Pricing-Aware Privacy Mapping Mechanism -- 4.3.1 Constructing Optimization Model -- 4.3.2 Solving Optimization Model -- 4.3.3 Computational Complexity -- 4.4 Privacy Analysis -- 4.5 Performance Evaluation -- 4.5.1 Simulation Settings -- 4.5.2 Simulation Results -- 4.6 Summary and Further Reading -- Chapter 5 Data Poisoning Attacks and Defenses to LDP-based Crowdsensing -- 5.1 Problem Statement and Basic Concepts -- 5.1.1 Problem Statement -- 5.1.2 Basic Concepts -- 5.2 Data Poisoning Attacks Hidden behind the LDP Noise -- 5.2.1 LDP-based Privacy-Preserving Truth Discovery Methods -- 5.2.2 Formulating Optimal Data Poisoning Attacks -- 5.2.3 Finding Optimal Data Poisoning Attacks -- 5.3 Countermeasures: Designing Optimal Defenses -- 5.3.1 Formulating Optimal Countermeasures -- 5.3.2 Finding Optimal Countermeasures -- 5.4 Computational Complexity and Limitations of Attacks and Defenses -- 5.4.1 Computational Complexity of Attacks and Defenses -- 5.4.2 Limitations of Attacks and Defenses -- 5.5 Performance Evaluation -- 5.5.1 Simulation Settings -- 5.5.2 Simulation Results -- 5.6 Summary and Further Reading -- Chapter 6 Data Poisoning Attacks and Defenses to CDP-based Crowdsensing -- 6.1 Problem Statement and Basic Concepts -- 6.1.1 Problem Statement -- 6.1.2 Basic Concepts -- 6.2 Formulating Game Model between Attacks and Defenses -- 6.2.1 Zero-Sum Stackelberg Game -- 6.2.2 Unveiling the Normal Behavior of Workers -- 6.3 Finding Optimal Data Poisoning Attacks and Defenses -- 6.3.1 Defense Strategy for Defenders -- 6.3.2 Attack Strategy for Attackers -- 6.3.3 Local Minimax Point of Defenders-Attackers Interaction -- 6.4 Computational Complexity and Limitations of Attacks and Defenses -- 6.4.1 Computational Complexity of Attacks and defenses -- 6.4.2 Limitations of Attacks and Defenses 5 6.5 Performance Evaluation -- 6.5.1 Simulation Settings -- 6.5.2 Simulation Results -- 6.6 Summary and Further Reading -- Chapter 7 Conclusion and Future Works -- 7.1 Conclusion -- 7.2 Future Works.This book investigates perturbation-based privacy in crowdsensing systems. The authors first present an explicit overview of crowdsensing systems and privacy challenges and briefly discuss how the noise added by perturbation-based privacy-preserving techniques could inevitably degrade data quality and facilitate the success of data poisoning attacks on crowdsensing. The authors then give a comprehensive review of classical privacy notions for perturbation-based privacy-preserving techniques and theoretically analyze the relations between these privacy notions. The next four chapters conduct a series of studies on privacy preservation in crowdsensing systems from three dimensions of data privacy, data utility and data poisoning. Finally, the book explores open issues and outlines future research directions for perturbation-based privacy preservation in crowdsensing systems. Advanced-level students majoring in the areas of network security, computer science and electrical engineering will find this book useful as a secondary text. Professionals seeking privacy-preserving solutions for crowdsensing systems will also find this book useful as a reference.Wireless Networks,2366-1445Computer networksData protectionLaw and legislationWireless communication systemsMobile communication systemsComputer Communication NetworksPrivacyWireless and Mobile CommunicationComputer networks.Data protectionLaw and legislation.Wireless communication systems.Mobile communication systems.Computer Communication Networks.Privacy.Wireless and Mobile Communication.004.6Zheng Zhirun1862370Li Zhetao1862371Shen Xuemin1605727MiAaPQMiAaPQMiAaPQBOOK9911047817803321Perturbation Based Privacy in Crowdsensing4468624UNINA