共 35 条
[11]
The Algorithmic Foundations of Differential Privacy
[J].
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE,
2013, 9 (3-4)
:211-406
[13]
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
[14]
Goodfellow I.J., 2015, 2015 INT C LEARN REP
[15]
Goodfellow I, 2017, Arxiv, DOI arXiv:1701.00160
[17]
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:603-618
[19]
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks
[J].
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018,
2018, 11050
:273-294
[20]
Neural Trojans
[J].
2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD),
2017,
:45-48