共 25 条
[1]
Boenisch F., 2023, Proceedings on Privacy Enhancing Technologies, V12, P158
[2]
Choquette C.A., 2021, INT C LEARN REPR ICL
[3]
Choquette-Choo CA, 2021, PR MACH LEARN RES, V139
[4]
A new technique ensuring privacy in big data: K-anonymity without prior value of the threshold k
[J].
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017),
2018, 127
:52-59
[5]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[7]
Goodfellow I. J., 2017, 5 INT C LEARN REPR I
[9]
Hinton G.E., 2015, P NEURIPS DLRL WORKS
[10]
Hu H., 2020, IEEE Signal Processing Letters, V29, P1197