共 51 条
[1]
Abadi M., 2016, TENSORFLOW LARGE SCA
[2]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[3]
[Anonymous], 2015, Randomized response and related methods: Surveying sensitive data
[4]
[Anonymous], 2017, ARXIV170302952
[5]
Local, Private, Efficient Protocols for Succinct Histograms
[J].
STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2015,
:127-135
[6]
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I,
2016, 9985
:635-658
[10]
Chan T.-H Hubert, 2012, Privacy Enhancing Technologies. Proceedings 12th International Symposium, PETS 2012, P140, DOI 10.1007/978-3-642-31680-7_8