Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Privacy-Preserving Machine Learning
Privacy-Preserving Machine Learning

Privacy-Preserving Machine Learning: A use-case-driven approach to building and protecting ML pipelines from privacy and security threats

Arrow left icon
Profile Icon Srinivasa Rao Aravilli
Arrow right icon
£9.99 per month
Full star icon Full star icon Full star icon Full star icon Full star icon 5 (8 Ratings)
Paperback May 2024 402 pages 1st Edition
eBook
£26.99
Paperback
£33.99
Subscription
Free Trial
Renews at £9.99p/m
Arrow left icon
Profile Icon Srinivasa Rao Aravilli
Arrow right icon
£9.99 per month
Full star icon Full star icon Full star icon Full star icon Full star icon 5 (8 Ratings)
Paperback May 2024 402 pages 1st Edition
eBook
£26.99
Paperback
£33.99
Subscription
Free Trial
Renews at £9.99p/m
eBook
£26.99
Paperback
£33.99
Subscription
Free Trial
Renews at £9.99p/m

What do you get with a Packt Subscription?

Free for first 7 days. £13.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Key benefits

  • Understand machine learning privacy risks and employ machine learning algorithms to safeguard data against breaches
  • Develop and deploy privacy-preserving ML pipelines using open-source frameworks
  • Gain insights into confidential computing and its role in countering memory-based data attacks
  • Purchase of the print or Kindle book includes a free PDF eBook

Description

– In an era of evolving privacy regulations, compliance is mandatory for every enterprise – Machine learning engineers face the dual challenge of analyzing vast amounts of data for insights while protecting sensitive information – This book addresses the complexities arising from large data volumes and the scarcity of in-depth privacy-preserving machine learning expertise, and covers a comprehensive range of topics from data privacy and machine learning privacy threats to real-world privacy-preserving cases – As you progress, you’ll be guided through developing anti-money laundering solutions using federated learning and differential privacy – Dedicated sections will explore data in-memory attacks and strategies for safeguarding data and ML models – You’ll also explore the imperative nature of confidential computation and privacy-preserving machine learning benchmarks, as well as frontier research in the field – Upon completion, you’ll possess a thorough understanding of privacy-preserving machine learning, equipping them to effectively shield data from real-world threats and attacks

Who is this book for?

– This comprehensive guide is for data scientists, machine learning engineers, and privacy engineers – Prerequisites include a working knowledge of mathematics and basic familiarity with at least one ML framework (TensorFlow, PyTorch, or scikit-learn) – Practical examples will help you elevate your expertise in privacy-preserving machine learning techniques

What you will learn

  • Study data privacy, threats, and attacks across different machine learning phases
  • Explore Uber and Apple cases for applying differential privacy and enhancing data security
  • Discover IID and non-IID data sets as well as data categories
  • Use open-source tools for federated learning (FL) and explore FL algorithms and benchmarks
  • Understand secure multiparty computation with PSI for large data
  • Get up to speed with confidential computation and find out how it helps data in memory attacks

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : May 24, 2024
Length: 402 pages
Edition : 1st
Language : English
ISBN-13 : 9781800564671
Category :
Languages :

What do you get with a Packt Subscription?

Free for first 7 days. £13.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Product Details

Publication date : May 24, 2024
Length: 402 pages
Edition : 1st
Language : English
ISBN-13 : 9781800564671
Category :
Languages :

Packt Subscriptions

See our plans and pricing
Modal Close icon
£9.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 6,500+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
£99.99 billed annually
Feature tick icon Unlimited access to Packt's library of 6,500+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just £5 each
Feature tick icon Exclusive print discounts
£139.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 6,500+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just £5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total £ 115.97
Transformers for Natural Language Processing and Computer Vision
£41.99
Mastering NLP from Foundations to LLMs
£39.99
Privacy-Preserving Machine Learning
£33.99
Total £ 115.97 Stars icon
Visually different images

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Full star icon 5
(8 Ratings)
5 star 100%
4 star 0%
3 star 0%
2 star 0%
1 star 0%
Filter icon Filter
Top Reviews

Filter reviews by




Steven Fernandes Jun 25, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
A comprehensive guide that explores data privacy threats and attacks across different ML phases. It delves into real-world cases from Uber and Apple to illustrate differential privacy and data security enhancements. The book covers IID and non-IID data sets, data categories, and the use of open-source tools for federated learning. It also provides insights into FL algorithms, benchmarks, secure multiparty computation with PSI for large data, and confidential computation to protect against data-in-memory attacks. A must-read for anyone looking to secure their ML projects.
Amazon Verified review Amazon
P N V S Murthy Jun 09, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
The book on "Privacy-Preserving Machine Learning" offers an in-depth journey from foundational principles to sophisticated techniques, enriched with real-world case studies. It equips readers with both theoretical understanding and practical skills in implementing privacy-preserving methods in machine learning, making it an essential guide for navigating the complexities of data privacy today.The first section equip readers with a foundational understanding of data privacy and machine learning from a privacy-centric viewpoint, catering to a wide audience from enthusiasts to professionals.The second section of the book receives acclaim for its comprehensive guidance on privacy-preserving data analysis and differential privacy, merging theoretical concepts with practical applications. this section explores differential privacy algorithms and their associated challenges, delivering in-depth knowledge crucial for professionals. this section is dedicated to the practical application of differential privacy in real-world scenarios, providing valuable insights and examples for developers and data scientists.The third section delve deeply into federated learning (FL), underscoring its significance in improving privacy within machine learning. This section covers FL's foundational concepts, techniques, and practical use cases, acting as a valuable resource for professionals looking to incorporate FL into their projects. The following section broadens this exploration, examining FL through benchmarks, recent research, and its application in the start-up environment, shedding light on the potential and hurdles associated with FL.The fourth section of the book delve into sophisticated subjects within data privacy and security, with each part focusing on a distinct facet of the domain. This section demystifies cryptographic methods for data privacy, rendering intricate techniques understandable for a broad readership. This section is dedicated to confidential computing, elaborating on the deployment of Trusted Execution Environments (TEEs) and methods for safeguarding data in memory. This section contemplates the privacy issues associated with developing and utilizing large language models (LLMs), offering a mix of basic and in-depth insights. Collectively, these parts provide a thorough examination of cutting-edge topics in data privacy and security.
Amazon Verified review Amazon
Amazon Customer Jun 27, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Majority of the plethora of information currently available are either solely devoted to Machine Learning/Deep Learning/AI or particularly focussed on Privacy. The connection between the two is evolving at a very rapid pace and this book does ample justice to the topic by exploring various concepts lying at the synergy of Machine Learning and Privacy - a one stop shop covering issues at the forefront of Privacy driven AI, under its ambit.Of particular interest to me has been the topics covered under Differential Privacy, Synthetic Data Generation and LLM's. Plenty of hands-on as well.Perhaps a more in-depth treatment of AI related to privacy breaking ideas like Reconstruction attacks, Inference attacks etc. could have been explored.However, on a whole, this books serves as a ready reckoner to the diverse topics under Privacy and Machine Learning. There is definitely something in it to the practitioner as well as to the novice, alike.
Amazon Verified review Amazon
Tanya Aug 07, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Privacy-Preserving Machine Learning" by Srinivasa Rao Aravilli is a great book that explains how to keep data private while using machine learning. The author makes tough ideas easy to understand and gives useful examples. It's a must-read for anyone who wants to create safe and ethical AI systems. Highly recommended for its clear explanations and importance in today's tech world.
Amazon Verified review Amazon
Rajesh Kumar M Aug 16, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book serves as an essential guide for anyone aiming to implement machine learning techniques in the area of security and privacy.The author exhibits a deep understanding of the security and privacy field coupled with a deep understanding of how these aspects need to be integrated with machine learning. He not only show a keen comprehension of the complex landscape of security and privacy, but also articulate the nuances of merging these with the dynamic field of machine learning, underscoring the necessity for strategic and mindful integration.The book lays the groundwork with an introduction to Data Privacy, making a distinction between confidential and personally confidential data, and emphasising the significance of data privacy regulations, laws and the rights of data subjects. It provides a thorough explanation of the "Privacy by design"(PbD) framework and its foundational principles, illustrating how each principle can be applied using detailed examples of applications/platforms. It also addresses the consequences of Privacy Breaches via notable case studies across various application types, including web applications and AI/ML applications. The book introduces frameworks such as LINDDUN, STRIDE, and PLOT4AI to enhance understanding of privacy threat modeling.The book talks about how to maintain data privacy during analysis, focusing on Differential Privacy. This provides a strong foundation for incorporating privacy measures when conducting data analysis and machine learning. The book explores various methods to ensure data privacy, such as Data Anonymisation (for example, K-anonymity) and Data Aggregation, supported by examples and code for better understanding. It also explains how to prevent reconstruction attacks on SQL using the Open Diffix framework and delves into the complexities of differential privacy, including privacy loss, budgets, and methods. The book further elaborates on differential privacy algorithms like Laplace, Gaussian, among others, and underscores the limitations of differential privacy. It includes a practical section that demonstrates the application of differential privacy in fraud detection using Machine Learning and Deep Learning frameworks (like PyDP, PipelineDP, tmlt-analytics, PySpark, diffprivlib, PyTorch, and Opacus), accompanied by real-world examples.The section on Federated Learning (FL) explains its importance in dealing with privacy issues by allowing models to be trained without needing to centralise data. It talks about the difference between IID and non-IID datasets, which are very important for implementing FL. It introduces FL methods like FedAvg, FedYogi, FedSGD, and shows how the Flower framework can be used for a case in the finance sector. It also looks at FL benchmarks and datasets, offering advice on choosing FL projects based on the type of data and how to evaluate them. Moreover, it talks about the latest research in FL, methodologies, challenges, and how startups are helping to advance FL technology. This gives a full overview of the current and future opportunities in federated learning.The book talks about ways to enhance privacy like homomorphic encryption (HE) and secure multiparty computation (SMC). It goes into detail about how they work, their math foundations, and how they are used in machine learning to do calculations on encrypted data. It also introduces zero-knowledge proofs (ZKP), which can check knowledge without giving away the information itself. It looks at the idea of confidential computing, highlighting the need to keep data in memory safe using trusted execution environments (TEEs) and source code attestation to stop insider threats. It talks about the privacy weak points of large language models (LLMs) and how to keep privacy when using these models, including ways to defend against different privacy attacks. Lastly, it checks the support for secure enclaves across major cloud service providers, helping in deciding how to deploy applications that rely on secure enclaves. This full overview highlights the importance of techniques that preserve privacy in keeping sensitive data safe across different stages and platforms, making sure data is useful while keeping it private.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is included in a Packt subscription? Chevron down icon Chevron up icon

A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content

How can I cancel my subscription? Chevron down icon Chevron up icon

To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.

What are credits? Chevron down icon Chevron up icon

Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.

What happens if an Early Access Course is cancelled? Chevron down icon Chevron up icon

Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.

Where can I send feedback about an Early Access title? Chevron down icon Chevron up icon

If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team. 

Can I download the code files for Early Access titles? Chevron down icon Chevron up icon

We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.

When we publish the book, the code files will also be available to download from the Packt website.

How accurate is the publication date? Chevron down icon Chevron up icon

The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.

How will I know when new chapters are ready? Chevron down icon Chevron up icon

We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.

I am a Packt subscriber, do I get Early Access? Chevron down icon Chevron up icon

Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.

How is Early Access delivered? Chevron down icon Chevron up icon

Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.

How do I buy Early Access content? Chevron down icon Chevron up icon

Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.

What is Early Access? Chevron down icon Chevron up icon

Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.