共 33 条
[1]
Balakrishnan R., 2022, INT C LEARN REPR, DOI [10.48550/arXiv.2107.11728, DOI 10.48550/ARXIV.2107.11728]
[2]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Caldas S., 2018, arXiv
[6]
Fraboni Y, 2021, PR MACH LEARN RES, V139
[7]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[8]
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:619-633
[10]
Goetz J, 2019, Arxiv, DOI arXiv:1909.12641