Näytä suppeat kuvailutiedot

dc.contributor.authorKilpala, Minna
dc.contributor.authorKärkkäinen, Tommi
dc.contributor.editorSipola, Tuomo
dc.contributor.editorAlatalo, Janne
dc.contributor.editorWolfmayr, Monika
dc.contributor.editorKokkonen, Tero
dc.date.accessioned2024-11-13T11:45:43Z
dc.date.available2024-11-13T11:45:43Z
dc.date.issued2024
dc.identifier.citationKilpala, M., & Kärkkäinen, T. (2024). Artificial Intelligence and Differential Privacy : Review of Protection Estimate Models. In T. Sipola, J. Alatalo, M. Wolfmayr, & T. Kokkonen (Eds.), <i>Artificial Intelligence for Security : Enhancing Protection in a Changing World</i> (pp. 35-54). Springer. <a href="https://doi.org/10.1007/978-3-031-57452-8_3" target="_blank">https://doi.org/10.1007/978-3-031-57452-8_3</a>
dc.identifier.otherCONVID_220919635
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/98394
dc.description.abstractDifferential Privacy (DP) can provide strong guarantees that personal information is not disclosed in data sets. This is ensured from mathematical, theoretical, and relational proof of privacy, which makes it important to understand the actual behavior of the DP-based protection models. For this purpose, we will review what kind of frameworks or models are available to estimate how well an implemented differential privacy model works. Special attention is paid to how to assess that a certain level of privacy has been reached, what configurations were used, and how to estimate the privacy loss. Our goal is to locate a common framework that could help one decide, based on privacy requirements, which model and configuration should be used and how its protection can be ensured.en
dc.format.extent366
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofArtificial Intelligence for Security : Enhancing Protection in a Changing World
dc.rightsIn Copyright
dc.titleArtificial Intelligence and Differential Privacy : Review of Protection Estimate Models
dc.typebook part
dc.identifier.urnURN:NBN:fi:jyu-202411137237
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/BookItem
dc.relation.isbn978-3-031-57451-1
dc.type.coarhttp://purl.org/coar/resource_type/c_3248
dc.description.reviewstatuspeerReviewed
dc.format.pagerange35-54
dc.type.versionacceptedVersion
dc.rights.copyright© 2024 the Authors
dc.rights.accesslevelembargoedAccessfi
dc.type.publicationbookPart
dc.subject.ysotietosuoja
dc.subject.ysoyksilönsuoja
dc.subject.ysoyksityisyys
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p3636
jyx.subject.urihttp://www.yso.fi/onto/yso/p3637
jyx.subject.urihttp://www.yso.fi/onto/yso/p10909
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-031-57452-8_3
dc.type.okmA3


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright