<p><span>This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is gener
Privacy Preservation in IoT: Machine Learning Approaches: A Comprehensive Survey and Use Cases (SpringerBriefs in Computer Science)
β Scribed by Youyang Qu; Longxiang Gao; Shui Yu; Yong Xiang
- Tongue
- English
- Category
- Library
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
<span>This book discusses the state-of-the-art in privacy-preserving deep learning (PPDL), especially as a tool for machine learning as a service (MLaaS), which serves as an enabling technology by combining classical privacy-preserving and cryptographic protocols with deep learning. Google and Micro
<span>This book shows how machine learning can detect moving objects in a digital video stream. The authors present different background subtraction approaches, foreground segmentation, and object tracking approaches to accomplish this. They also propose an algorithm that considers a multimodal back
<p><span>Image Quality Assessment is well-known for measuring the perceived image degradation of natural scene images but is still an emerging topic for computer-generated images. This book addresses this problem and presents recent advances based on soft computing. It is aimed at students, practiti
<p><span>This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are no
<span>This SpringerBrief presents the underlying principles of machine learning and how to deploy various deep learning tools and techniques to tackle and solve certain challenges facing the cybersecurity industry.<br>By implementing innovative deep learning solutions, cybersecurity researchers, stu