共 34 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
Alaggan M, 2015, Arxiv, DOI arXiv:1504.06998
[3]
McMahan HB, 2018, Arxiv, DOI arXiv:1710.06963
[4]
Carlini N, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P267
[6]
Chathoth A. K., 2022, 2022 IEEE INT C BIG, P5682
[8]
Calibrating noise to sensitivity in private data analysis
[J].
THEORY OF CRYPTOGRAPHY, PROCEEDINGS,
2006, 3876
:265-284
[9]
The Algorithmic Foundations of Differential Privacy
[J].
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE,
2013, 9 (3-4)
:211-406
[10]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333