共 69 条
[21]
Does Learning Require Memorization? A Short Tale about a Long Tail
[J].
PROCEEDINGS OF THE 52ND ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '20),
2020,
:954-959
[23]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[24]
Howard AG, 2017, Arxiv, DOI [arXiv:1704.04861, 10.48550/arXiv.1704.04861]
[25]
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:619-633
[26]
A Framework for Edge-Assisted Healthcare Data Analytics using Federated Learning
[J].
2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA),
2020,
:3423-3427
[28]
Deep Residual Learning for Image Recognition
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:770-778
[29]
Blockchain-Enabled Internet of Medical Things to Combat COVID-19
[J].
IEEE Internet of Things Magazine,
2020, 3 (03)
:52-57