共 16 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[3]
ElGamal Taher., 1985, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
[4]
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:603-618
[5]
Jiang S., 2018, IEEE ACCESS, V6, p65 779
[6]
Konevcny J., 2016, P NIPS WORKSH PRIV M
[7]
Li Tian., 2020, P MACHINE LEARNING S, V2, P429
[8]
McMahan HB, 2017, PR MACH LEARN RES, V54, P1273
[10]
Roman R., 2018, COMPUTER, V51, P46