共 27 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
Baldi P., 2011, Proceedings of the 2011 International Conference on Unsupervised and Transfer Learning Workshop - Volume 27. UTLW'11, P37
[3]
STUDIO
[5]
Image Pixelization with Differential Privacy
[J].
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018,
2018, 10980
:148-162
[6]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[7]
Geiping J, 2020, 34 C NEURAL INFORM P, V33
[8]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[9]
Hore Alain, 2010, Proceedings of the 2010 20th International Conference on Pattern Recognition (ICPR 2010), P2366, DOI 10.1109/ICPR.2010.579
[10]
Huang GaryB., 2014, Labeled Faces in the Wild: Updates and New Reporting Procedures