LEADER 03556nam 22007455 450 001 9910495251903321 005 20230807143415.0 010 $a981-16-3750-4 024 7 $a10.1007/978-981-16-3750-6 035 $a(CKB)4100000011990102 035 $a(MiAaPQ)EBC6683159 035 $a(Au-PeEL)EBL6683159 035 $a(DE-He213)978-981-16-3750-6 035 $a(PPN)260305464 035 $a(EXLCZ)994100000011990102 100 $a20210723d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPersonalized Privacy Protection in Big Data /$fby Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu 205 $a1st ed. 2021. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2021. 215 $a1 online resource (148 pages) 225 1 $aData Analytics,$x2520-1867 311 $a981-16-3749-0 327 $aChapter 1: Introduction -- Chapter 2: Current Methods of Privacy Protection -- Chapter 3: Privacy Attacks -- Chapter 4: Personalize Privacy Defense -- Chapter 5: Future Directions -- Chapter6: Summary and Outlook. 330 $aThis book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic. In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike. 410 0$aData Analytics,$x2520-1867 606 $aData protection?Law and legislation 606 $aQuantitative research 606 $aData mining 606 $aArtificial intelligence?Data processing 606 $aCoding theory 606 $aInformation theory 606 $aComputer security 606 $aPrivacy 606 $aData Analysis and Big Data 606 $aData Mining and Knowledge Discovery 606 $aData Science 606 $aCoding and Information Theory 606 $aPrinciples and Models of Security 615 0$aData protection?Law and legislation. 615 0$aQuantitative research. 615 0$aData mining. 615 0$aArtificial intelligence?Data processing. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer security. 615 14$aPrivacy. 615 24$aData Analysis and Big Data. 615 24$aData Mining and Knowledge Discovery. 615 24$aData Science. 615 24$aCoding and Information Theory. 615 24$aPrinciples and Models of Security. 676 $a005.8 700 $aQu$b Youyang$0853697 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910495251903321 996 $aPersonalized privacy protection in big data$92833915 997 $aUNINA