共 45 条
[2]
Brophy J., 2021, P MACHINE LEARNING R, P1092
[3]
Towards Making Systems Forget with Machine Unlearning
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:463-480
[4]
Carlini N, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P267
[5]
When Machine Unlearning Jeopardizes Privacy
[J].
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2021,
:896-911
[6]
Chundawat V. S., 2023, PROC AAAI C ARTIF IN, P1
[7]
Robust Traceability from Trace Amounts
[J].
2015 IEEE 56TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2015,
:650-669
[8]
Does Learning Require Memorization? A Short Tale about a Long Tail
[J].
PROCEEDINGS OF THE 52ND ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '20),
2020,
:954-959
[9]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[10]
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:619-633