Privacy-Preserving Machine Learning : A use-case-driven approach to building and protecting ML pipelines from privacy and security threats

Enregistré dans:
Détails bibliographiques
Auteur principal: Aravilli, Srinivasa Rao. (Auteur)
Autres auteurs: Hamilton, Sam. (Préface)
Support: E-Book
Langue: Anglais
Publié: Birmingham : Packt Publishing.
Autres localisations: Voir dans le Sudoc
Résumé: Gain hands-on experience in data privacy and privacy-preserving machine learning with open-source ML frameworks, while exploring techniques and algorithms to protect sensitive data from privacy breaches Key FeaturesUnderstand machine learning privacy risks and employ machine learning algorithms to safeguard data against breachesDevelop and deploy privacy-preserving ML pipelines using open-source frameworksGain insights into confidential computing and its role in countering memory-based data attacksPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionPrivacy regulations are evolving each year and compliance with privacy regulations is mandatory for every enterprise. Machine learning engineers are required to not only analyze large amounts of data to gain crucial insights, but also comply with privacy regulations to protect sensitive data. This may seem quite challenging considering the large volume of data involved and lack of in-depth expertise in privacy-preserving machine learning. This book delves into data privacy, machine learning privacy threats, and real-world cases of privacy-preserving machine learning, as well as open-source frameworks for implementation. You'll be guided through developing anti-money laundering solutions via federated learning and differential privacy. Dedicated sections also address data in-memory attacks and strategies for safeguarding data and ML models. The book concludes by discussing the necessity of confidential computation, privacy-preserving machine learning benchmarks, and cutting-edge research. By the end of this machine learning book, you'll be well-versed in privacy-preserving machine learning and know how to effectively protect data from threats and attacks in the real world.What you will learnStudy data privacy, threats, and attacks across different machine learning phasesExplore Uber and Apple cases for applying differential privacy and enhancing data securityDiscover IID and non-IID data sets as well as data categoriesUse open-source tools for federated learning (FL) and explore FL algorithms and benchmarksUnderstand secure multiparty computation with PSI for large dataGet up to speed with confidential computation and find out how it helps data in memory attacksWho this book is forThis book is for data scientists, machine learning engineers, and privacy engineers who have working knowledge of mathematics as well as basic knowledge in any one of the ML frameworks (TensorFlow, PyTorch, or scikit-learn)
Accès en ligne: Accès à l'E-book
LEADER 04162nmm a2200445 i 4500
001 ebook-280314531
005 20240917153255.0
007 cu|uuu---uuuuu
008 240917s2024||||uk ||||g|||| ||||||eng d
020 |a 9781800564220 
035 |a (OCoLC)1456999157 
035 |a FRCYB88957652 
035 |a FRCYB26088957652 
035 |a FRCYB24788957652 
035 |a FRCYB24888957652 
035 |a FRCYB29388957652 
035 |a FRCYB084688957652 
035 |a FRCYB087588957652 
035 |a FRCYB56788957652 
035 |a FRCYB097088957652 
035 |a FRCYB087088957652 
040 |a ABES  |b fre  |e AFNOR 
041 0 |a eng  |2 639-2 
100 1 |a Aravilli, Srinivasa Rao.  |4 aut.  |e Auteur 
245 1 0 |a Privacy-Preserving Machine Learning :  |b A use-case-driven approach to building and protecting ML pipelines from privacy and security threats   |c Srinivasa Rao Aravilli ; [Foreword by Sam Hamilton]. 
264 1 |a Birmingham :  |b Packt Publishing. 
264 2 |a Paris :  |b Cyberlibris,  |c 2024. 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
337 |b b  |2 isbdmedia 
338 |b ceb  |2 RDAfrCarrier 
500 |a Couverture (https://static2.cyberlibris.com/books_upload/136pix/9781800564220.jpg). 
506 |a L'accès en ligne est réservé aux établissements ou bibliothèques ayant souscrit l'abonnement  |e Cyberlibris 
520 |a Gain hands-on experience in data privacy and privacy-preserving machine learning with open-source ML frameworks, while exploring techniques and algorithms to protect sensitive data from privacy breaches Key FeaturesUnderstand machine learning privacy risks and employ machine learning algorithms to safeguard data against breachesDevelop and deploy privacy-preserving ML pipelines using open-source frameworksGain insights into confidential computing and its role in countering memory-based data attacksPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionPrivacy regulations are evolving each year and compliance with privacy regulations is mandatory for every enterprise. Machine learning engineers are required to not only analyze large amounts of data to gain crucial insights, but also comply with privacy regulations to protect sensitive data. This may seem quite challenging considering the large volume of data involved and lack of in-depth expertise in privacy-preserving machine learning. This book delves into data privacy, machine learning privacy threats, and real-world cases of privacy-preserving machine learning, as well as open-source frameworks for implementation. You'll be guided through developing anti-money laundering solutions via federated learning and differential privacy. Dedicated sections also address data in-memory attacks and strategies for safeguarding data and ML models. The book concludes by discussing the necessity of confidential computation, privacy-preserving machine learning benchmarks, and cutting-edge research. By the end of this machine learning book, you'll be well-versed in privacy-preserving machine learning and know how to effectively protect data from threats and attacks in the real world.What you will learnStudy data privacy, threats, and attacks across different machine learning phasesExplore Uber and Apple cases for applying differential privacy and enhancing data securityDiscover IID and non-IID data sets as well as data categoriesUse open-source tools for federated learning (FL) and explore FL algorithms and benchmarksUnderstand secure multiparty computation with PSI for large dataGet up to speed with confidential computation and find out how it helps data in memory attacksWho this book is forThis book is for data scientists, machine learning engineers, and privacy engineers who have working knowledge of mathematics as well as basic knowledge in any one of the ML frameworks (TensorFlow, PyTorch, or scikit-learn) 
700 1 |a Hamilton, Sam.  |4 aui.  |e Préface 
856 |q HTML  |u https://srvext.uco.fr/login?url=https://univ.scholarvox.com/book/88957652  |w Données éditeur  |z Accès à l'E-book 
886 2 |2 unimarc  |a 181  |a i#  |b xxxe## 
993 |a E-Book  
994 |a BNUM 
995 |a 280314531