共 61 条
[21]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[22]
GDPR, 2017, Right to erasure (right to be forgotten)
[23]
Ginart AA, 2019, ADV NEUR IN, V32
[24]
Goldberger J, 2003, NINTH IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION, VOLS I AND II, PROCEEDINGS, P487
[25]
Gu TY, 2019, Arxiv, DOI arXiv:1708.06733
[26]
Guerraoui Rachid, 2018, PROC 35 INT C MACH L, P3521
[27]
Harding E L., 2019, J Data Prot Priv, V2, P234
[28]
He Y., 2021, arXiv
[29]
Reinforcement learning: A survey
[J].
JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH,
1996, 4
:237-285
[30]
Kairouz P., 2019, arXiv, DOI DOI 10.48550/ARXIV.1912.04977