共 44 条
- [1] Deep Learning with Differential Privacy [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
- [2] McMahan HB, 2018, Arxiv, DOI arXiv:1710.06963
- [3] FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping [J]. 28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
- [4] Chang H., 2019, P NIPS WORKSH NEW FR, P1
- [5] A CLASS OF BOUNDED APPROXIMATION ALGORITHMS FOR GRAPH PARTITIONING [J]. NETWORKS, 1990, 20 (02) : 181 - 195
- [6] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1322 - 1333
- [7] Geiping J., 2020, Proc. Adv. Neural Inf. Process. Syst., V33, P16937
- [8] Geyer R.C., 2017, arXiv
- [10] Goodfellow K., 2018, INT C LEARN REPR, P1