共 41 条
- [1] Deep Learning with Differential Privacy [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
- [2] How to Accurately and Privately Identify Anomalies [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 719 - 736
- [3] Balle B, 2018, PR MACH LEARN RES, V80
- [4] Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds [J]. 2014 55TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2014), 2014, : 464 - 473
- [5] Beimel A, 2010, LECT NOTES COMPUT SC, V5978, P437, DOI 10.1007/978-3-642-11799-2_26
- [6] Boyd S., 2004, CONVEX OPTIMIZATION, DOI 10.1017/CBO9780511804441
- [7] Securely Sampling Biased Coins with Applications to Differential Privacy [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 603 - 614
- [8] MVG Mechanism: Differential Privacy under Matrix-Valued Query [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 230 - 246
- [9] Chaudhuri K, 2011, J MACH LEARN RES, V12, P1069
- [10] Dua D., 2017, UCI MACHINE LEARNING