共 78 条
[1]
Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L., Deep learning with differential privacy, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308-318, (2016)
[2]
Adesuyi TA, Kim BM., A neuron noise-injection technique for privacy preserving deep neural networks, Open Computer Science, 10, 1, pp. 137-152, (2020)
[3]
Ali S, Ashraf S, Yousaf MS, Riaz S, Wang G., Automated segmentation to make hidden trigger backdoor attacks robust against deep neural networks, Applied Sciences, 13, 7, (2023)
[4]
Ali S, Wang G, Riaz S, Rafique T., Preserving the privacy of dependent tuples using enhanced differential privacy, Human-Centric Computing and Information Sciences, 12, pp. 1-15, (2022)
[5]
Ateniese G, Mancini LV, Spognardi A, Villani A, Vitali D, Felici G., Hacking smart machines with smarter ones: how to extract meaningful data from machine learning classifiers, International Journal of Security and Networks, 10, 3, pp. 137-150, (2015)
[6]
Backes M, Humbert M, Pang J, Zhang Y., Walk2friends: inferring social links from mobility profiles, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS ’17, pp. 1943-1957, (2017)
[7]
Bernau D, Grassal P-W, Robl J, Kerschbaum F., Assessing differentially private deep learning with membership inference, (2019)
[8]
Berrang P, Humbert M, Zhang Y, Lehmann I, Eils R, Backes M., Dissecting privacy risks in biomedical data, 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 62-76, (2018)
[9]
Calandrino JA, Kilzer A, Narayanan A, Felten EW, Shmatikov V., You might also like:” privacy risks of collaborative filtering, 2011 IEEE Symposium on Security and Privacy, pp. 231-246, (2011)
[10]
Carlini N, Liu C, Erlingsson U, Kos J, Song D., The secret sharer: evaluating and testing unintended memorization in neural networks, 28th USENIX Security Symposium (USENIX Security 19), pp. 267-284, (2019)