共 35 条
[1]
Abadi M., 2016, arXiv, DOI DOI 10.48550/ARXIV.1610.06918
[2]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[3]
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[4]
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[5]
Brendan McMahan H., 2018, P INT C LEARN REPR, P3
[6]
Carlini N, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P267
[7]
Congzheng Song, 2020, ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, P344, DOI 10.1145/3320269.3384731
[8]
Turning Federated Learning Systems Into Covert Channels
[J].
IEEE ACCESS,
2022, 10
:130642-130656
[10]
Cantareira GD, 2021, Arxiv, DOI arXiv:2103.10229