"Data Intelligence Knowledge Map" - Privacy Computing Knowledge System

32e09524fdbee8e00878fb9313b0fe6d.jpeg

Add gzh "big data iron eater"

Reply to "Knowledge Map

Take "Data Intelligence Knowledge Map" Privacy Computing Knowledge System


The concept, development history, technical principles, main algorithms, application scenarios, industrial development, legal compliance, etc. of privacy computing are discussed, and relevant issues and trends are analyzed. Privacy computing is a cross-fusion technology covering many disciplines. At present, the mainstream privacy computing technology is mainly divided into three directions: the first category is cryptography-based privacy computing technology represented by multi-party secure computing; the second category is federated learning The third category is the trusted hardware-based privacy computing technology represented by the trusted execution environment. Different technologies are often used in combination to complete the calculation and analysis tasks of data while ensuring the security and privacy of the original data. The following figure explains the privacy computing knowledge system in detail.

7d910ce01b42bdf8944498d0bb241e61.jpeg

"Data Intelligence Knowledge Map"

The data intelligence knowledge map, compiled and released by the datafun community, includes four major areas: data collection and governance, data architecture, data capabilities, and data applications. It includes not only relatively traditional technical modules such as data collection, data governance, and data warehouse, but also cloud computing. Native, causal inference, pre-training and other cutting-edge technology modules, this official account will sort out and release them one by one.


e0ec15aed8d18de6d90048492d0995d6.jpeg

Source: Organized from datafun data intelligent knowledge map

Disclaimer: The above reports are all obtained by this platform through open and legal channels. The copyright of the report belongs to the original author/publisher. If there is any infringement, please contact to delete it. The information is recommended reading and is for reference only. If you have any doubts about the content, please contact us. Contact the original authoring/publishing agency.

Guess you like

Origin blog.csdn.net/kuankuanerfei/article/details/131288562