共 16 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[3]
ElGamal T., 1985, A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
[4]
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:603-618
[5]
Jiang S., 2018, IEEE ACCESS, V6, p65 779
[6]
Konevcny J., 2016, P NIPS WORKSH PRIV M
[7]
Li T., 2020, PROC MACH LEARN SYST, V2, P429, DOI DOI 10.48550/ARXIV.1812.06127
[8]
McMahan HB, 2017, PR MACH LEARN RES, V54, P1273
[10]
Roman R., 2018, COMPUTER, V51, P46