共 30 条
[1]
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[2]
Doganay M., 2008, Proceedings of international workshop on Privacy and anonymity in information society, P3
[3]
Fang MH, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1623
[4]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[6]
Deep Residual Learning for Image Recognition
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:770-778
[7]
Kingma Diederik P, 2014, ARXIV PREPRINT ARXIV
[9]
Li X, 2020, Arxiv, DOI arXiv:1907.02189