共 60 条
- [1] Acharya J, 2018, ADV NEUR IN, V31
- [3] Alvim Mario S., 2012, Formal Aspects of Security and Trust. 8th International Workshop, FAST 2011. Revised Selected Papers, P39, DOI 10.1007/978-3-642-29420-4_3
- [4] Alvim MS, 2018, ENTROPY-SWITZ, V20, DOI [10.3390/e20050382, 10.3390/e20000382]
- [5] Axioms for Information Leakage [J]. 2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, : 77 - 92
- [6] Measuring Information Leakage using Generalized Gain Functions [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 265 - 279
- [7] [Anonymous], 2016, P 2016 ACM SIGSAC C
- [8] Information-theoretic Bounds for Differentially Private Mechanisms [J]. 2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 191 - 204
- [9] Revisiting Leakage Abuse Attacks [J]. 27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,