共 22 条
- [1] Deep Learning with Differential Privacy [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
- [3] Canetti R., 1996, 28 ANN ACM S THEOR C
- [4] Chaudhuri K., 2009, P ADV NEUR INF PROC, P289
- [5] Chaudhuri K, 2011, J MACH LEARN RES, V12, P1069
- [6] Calibrating noise to sensitivity in private data analysis [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284
- [7] The Algorithmic Foundations of Differential Privacy [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4): : 211 - 406
- [8] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1322 - 1333
- [9] Fully Homomorphic Encryption Using Ideal Lattices [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
- [10] Geyer R. C., 2017, arXiv