LEADER 06785nam 22005175 450 001 9911015632003321 005 20250703130247.0 010 $a3-031-72305-8 024 7 $a10.1007/978-3-031-72305-6 035 $a(MiAaPQ)EBC32195966 035 $a(Au-PeEL)EBL32195966 035 $a(CKB)39578204300041 035 $a(DE-He213)978-3-031-72305-6 035 $a(EXLCZ)9939578204300041 100 $a20250703d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Comprehensive Atlas of Robotic Urologic Surgery $eA Step-by-Step Guide to Adult and Pediatric Urologic Procedures /$fedited by Li-Ming Su, Jason P. Joseph, Christopher E. Bayne 205 $a3rd ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (1065 pages) 311 08$a3-031-72304-X 327 $aPart I: Getting Started in Robotic Surgery -- Chapter 1. Establishing a Robotics Team and Practice -- Chapter 2. Robotics Training: Virtual Simulation -- Chapter 3. Robotics Training: Model-Based Simulation -- Chapter 4. Robotic Instrumentation, Personnel, and Operating Room Setup: Da Vinci Xi -- Chapter 5. Performance Improvement and Working with Your Robotic Assistant -- Chapter 6. Anesthetic Considerations for Robotic Surgery -- Part II: Robotic Surgery of the Upper Urinary Tract: Da Vinci Xi Platform -- Chapter 7. Robot-Assisted Total and Partial Adrenalectomy -- Chapter 8. Robotic Partial Nephrectomy: Transperitoneal Approach -- Chapter 9. Robotic Partial Nephrectomy: Advanced Techniques and Intraoperative Imaging -- Chapter 10. Robotic Partial Nephrectomy: Retroperitoneal Approach -- Chapter 11. Robotic Radical Nephrectomy and Nephrectomy with Caval Tumor Thrombus -- Chapter 12. Robot-Assisted Radical Nephroureterectomy -- Chapter 13. Robotic Donor Nephrectomy and Renal Transplantation -- Chapter 14. Robot-Assisted Pyeloplasty -- Chapter 15. Robot-Assisted Laparoscopic Extended Pyelolithotomy and Ureterolithotomy -- Chapter 16. Robot-Assisted Ureteral Reconstruction -- Chapter 17. Robot-Assisted Retroperitoneal Lymph Node Dissection -- Chapter 18. Complications and Management of Robotic Assisted Partial Nephrectomy -- Part III: Robotic Surgery of the Lower Urinary Tract: Da Vinci Xi Platform -- Chapter 19. Robot-Assisted Radical and Partial Cystectomy -- Chapter 20. Robot-Assisted Urinary Diversion -- Chapter 21. Transperitoneal Robot-Assisted Radical Prostatectomy: Anterior Approach -- Chapter 22. Transperitoneal Robot-Assisted Radical Prostatectomy: Posterior Approach -- Chapter 23. Transperitoneal Robot-Assisted Radical Prostatectomy: Retzius Sparing Approach -- Chapter 24. Transperitoneal Robot-Assisted Radical Prostatectomy: Hood Approach -- Chapter 25. Extraperitoneal Robot-Assisted Radical Prostatectomy -- Chapter 26. Robotic Radical Prostatectomy: Complex Case Management -- Chapter 27. Robot-assisted Salvage Prostatectomy -- Chapter 28. Robotic Simple Prostatectomy -- Chapter 29. Robotic Pelvic Lymphadenectomy: Standard and Extended Techniques -- Chapter 30. Robotic-Assisted Inguinal Lymphadenectomy -- Chapter 31. Robotic Sacrocolpopexy -- Chapter 32. Robotic Vesicovaginal Fistula Repair -- Chapter 33. Robotic Rectovesical Fistula Repair -- Chapter 34. Robotic Lower Urinary Tract Reconstruction: Complex Cases -- Chapter 35. Robotic Approaches to Gender Affirmation Surgery -- Chapter 36. Robotic Surgical Procedures for Male Infertility -- Chapter 37. Complications and Management of Robotic Lower Urinary Tract Procedures -- Part IV. Robotic Pediatric Urologic Surgery -- Chapter 38. Pediatric Robotic Pyeloplasty -- Chapter 39. Pediatric Robotic Anti-reflux Procedures -- Chapter 40. Pediatric Robotic Heminephrectomy and Diverticulectomy -- Chapter 41. Advanced Robotic Reconstruction in Pediatric Urology -- Chapter 42. Emerging Indications for Robotics in Pediatric Urology -- Part V: Single Port Robotic Surgery -- Chapter 43. Robot Instrument, Personnel and Operating Room Setup: Da Vinci SP -- Chapter 44. Single-Port Robotic-Assisted Prostatectomy -- Chapter 45. Single-Port Robotic-Assisted Partial Nephrectomy -- Chapter 46. Single-Port Pyeloplasty -- Chapter 47. Single-Port Simple Prostatectomy -- Part VI: Robotic Platforms: Past, Present, Future Perspectives -- Chapter 48. Robotic Surgery: Past, Present, and Future. 330 $aThis third edition atlas provides the most current techniques and methods for treating both benign and malignant urologic conditions using the most modern robotic platforms and equipment available to date. Robotic surgery has had a very well-established and increasing role in the field of urology for the past two decades, in many cases almost completely replacing traditional open and laparoscopic approaches. Robotic surgery has continued to expand and has been applied to urologic conditions in both adult and pediatric patients. In addition, advancements in robotic technology have opened the door to single-site (vs multi-port) surgeries, further reducing the morbidity and improving the cosmesis for many urologic procedures. The book begins with a guide to getting started in robotic surgery with new chapters on robotics training and performance improvement. From here, the book comprehensively and systematically covers a wide range of surgical procedures, including surgeries of the upper and lower urinary tract using the daVinci Xi platform, robotic pediatric urologic surgeries, and single port (daVinci SP) robotic surgery. A discussion of the past, present, and future of robotic surgical platforms wraps up this comprehensive guide. Each chapter is written by internationally-recognized leaders in the field in a consistent step-by-step format to help the audience learn how to expand their robotic surgical techniques and capabilities for their patients. The Comprehensive Atlas of Robotic Urologic Surgery, Third Edition is a singular resource for individuals who are involved in robotic surgery including urologic surgeons, trainees, nurses, physician assistants, and anesthesiologists. 606 $aUrology 606 $aEndoscopic surgery 606 $aUrology 606 $aMinimally Invasive Surgery 615 0$aUrology. 615 0$aEndoscopic surgery. 615 14$aUrology. 615 24$aMinimally Invasive Surgery. 676 $a617.46059 700 $aSu$b Li-Ming$01833088 701 $aJoseph$b Jason P$01833089 701 $aBayne$b Christopher E$01833090 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911015632003321 996 $aThe Comprehensive Atlas of Robotic Urologic Surgery$94408022 997 $aUNINA LEADER 06822nam 22006135 450 001 9911047817803321 005 20250722130257.0 010 $a3-031-95052-6 024 7 $a10.1007/978-3-031-95052-0 035 $a(CKB)39698541100041 035 $a(MiAaPQ)EBC32227309 035 $a(Au-PeEL)EBL32227309 035 $a(DE-He213)978-3-031-95052-0 035 $a(EXLCZ)9939698541100041 100 $a20250722d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPerturbation Based Privacy in Crowdsensing /$fby Zhirun Zheng, Zhetao Li, Xuemin Shen 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (264 pages) 225 1 $aWireless Networks,$x2366-1445 311 08$a3-031-95051-8 327 $aChapter 1 -- 1.1 An Overview of Crowdsensing -- 1.1.1 Evolutionary Path of Crowdsensing -- 1.1.2 Architecture and Characteristics of Crowdsensing -- 1.1.3 Applications of Crowdsensing -- 1.2 Privacy Challenges in Crowdsensing -- 1.2.1 Privacy Leakage -- 1.2.2 Data Privacy vs. Data Utility -- 1.2.3 Data Privacy vs. Data Poisoning -- 1.3 Aim and Organization of Monograph -- Chapter 2 Perturbation-based Privacy Preservation -- 2.1 Classical Privacy Notions -- 2.1.1 Differentially Privacy -- 2.1.2 Identifiability -- 2.1.3 Mutual-Information Privacy -- 2.2 Relations between Privacy Notions -- 2.2.1 Differentially Privacy vs. Identifiability -- 2.2.2 Differentially Privacy vs. Mutual-Information Privacy -- 2.2.3 Identifiability vs. Mutual-Information Privacy -- 2.3 Summary -- Chapter 3 Semantic-Aware Trajectory Privacy Preservation in Crowdsensing -- 3.1 Problem Statement and Basic Concepts -- 3.1.1 Problem Statement -- 3.1.2 Basic Concepts -- 3.2 Privacy and Utility Metrics -- 3.2.1 Data Privacy Metric -- 3.2.2 Semantic Privacy Metric -- 3.2.3 Semantic-Aware Trajectory Utility Metric -- 3.3 Semantic-Aware Privacy Mapping Mechanism -- 3.3.1 Constructing Optimization Model -- 3.3.2 Solving Optimization Model -- 3.3.3 Computational Complexity -- 3.4 Privacy Analysis -- 3.5 Performance Evaluation -- 3.5.1 Simulation Settings -- 3.5.2 Simulation Results -- 3.6 Summary and Further Reading -- Chapter 4 Pricing-Aware Location Privacy Preservation in Crowdsensing -- 4.1 Problem Statement and Basic Concepts -- 4.1.1 Problem Statement -- 4.1.2 Basic Concepts -- 4.2 Utility Loss Metrics 4 4.2.1 Adaptive Supply and Demand Aware Grid -- 4.2.2 Dynamic Pricing Utility Metric -- 4.2.3 Ride-Matching Utility Metric -- 4.3 Pricing-Aware Privacy Mapping Mechanism -- 4.3.1 Constructing Optimization Model -- 4.3.2 Solving Optimization Model -- 4.3.3 Computational Complexity -- 4.4 Privacy Analysis -- 4.5 Performance Evaluation -- 4.5.1 Simulation Settings -- 4.5.2 Simulation Results -- 4.6 Summary and Further Reading -- Chapter 5 Data Poisoning Attacks and Defenses to LDP-based Crowdsensing -- 5.1 Problem Statement and Basic Concepts -- 5.1.1 Problem Statement -- 5.1.2 Basic Concepts -- 5.2 Data Poisoning Attacks Hidden behind the LDP Noise -- 5.2.1 LDP-based Privacy-Preserving Truth Discovery Methods -- 5.2.2 Formulating Optimal Data Poisoning Attacks -- 5.2.3 Finding Optimal Data Poisoning Attacks -- 5.3 Countermeasures: Designing Optimal Defenses -- 5.3.1 Formulating Optimal Countermeasures -- 5.3.2 Finding Optimal Countermeasures -- 5.4 Computational Complexity and Limitations of Attacks and Defenses -- 5.4.1 Computational Complexity of Attacks and Defenses -- 5.4.2 Limitations of Attacks and Defenses -- 5.5 Performance Evaluation -- 5.5.1 Simulation Settings -- 5.5.2 Simulation Results -- 5.6 Summary and Further Reading -- Chapter 6 Data Poisoning Attacks and Defenses to CDP-based Crowdsensing -- 6.1 Problem Statement and Basic Concepts -- 6.1.1 Problem Statement -- 6.1.2 Basic Concepts -- 6.2 Formulating Game Model between Attacks and Defenses -- 6.2.1 Zero-Sum Stackelberg Game -- 6.2.2 Unveiling the Normal Behavior of Workers -- 6.3 Finding Optimal Data Poisoning Attacks and Defenses -- 6.3.1 Defense Strategy for Defenders -- 6.3.2 Attack Strategy for Attackers -- 6.3.3 Local Minimax Point of Defenders-Attackers Interaction -- 6.4 Computational Complexity and Limitations of Attacks and Defenses -- 6.4.1 Computational Complexity of Attacks and defenses -- 6.4.2 Limitations of Attacks and Defenses 5 6.5 Performance Evaluation -- 6.5.1 Simulation Settings -- 6.5.2 Simulation Results -- 6.6 Summary and Further Reading -- Chapter 7 Conclusion and Future Works -- 7.1 Conclusion -- 7.2 Future Works. 330 $aThis book investigates perturbation-based privacy in crowdsensing systems. The authors first present an explicit overview of crowdsensing systems and privacy challenges and briefly discuss how the noise added by perturbation-based privacy-preserving techniques could inevitably degrade data quality and facilitate the success of data poisoning attacks on crowdsensing. The authors then give a comprehensive review of classical privacy notions for perturbation-based privacy-preserving techniques and theoretically analyze the relations between these privacy notions. The next four chapters conduct a series of studies on privacy preservation in crowdsensing systems from three dimensions of data privacy, data utility and data poisoning. Finally, the book explores open issues and outlines future research directions for perturbation-based privacy preservation in crowdsensing systems. Advanced-level students majoring in the areas of network security, computer science and electrical engineering will find this book useful as a secondary text. Professionals seeking privacy-preserving solutions for crowdsensing systems will also find this book useful as a reference. 410 0$aWireless Networks,$x2366-1445 606 $aComputer networks 606 $aData protection$xLaw and legislation 606 $aWireless communication systems 606 $aMobile communication systems 606 $aComputer Communication Networks 606 $aPrivacy 606 $aWireless and Mobile Communication 615 0$aComputer networks. 615 0$aData protection$xLaw and legislation. 615 0$aWireless communication systems. 615 0$aMobile communication systems. 615 14$aComputer Communication Networks. 615 24$aPrivacy. 615 24$aWireless and Mobile Communication. 676 $a004.6 700 $aZheng$b Zhirun$01862370 701 $aLi$b Zhetao$01862371 701 $aShen$b Xuemin$01605727 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911047817803321 996 $aPerturbation Based Privacy in Crowdsensing$94468624 997 $aUNINA