共 51 条
[1]
Abadi Martin, 2016, Proceedings of OSDI '16: 12th USENIX Symposium on Operating Systems Design and Implementation. OSDI '16, P265
[2]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[3]
[Anonymous], 2011, P 17 ACM SIGKDD INT, DOI [DOI 10.1145/2020408.2020487, DOI 10.2217/14622416.6.6.639, 10.1145/2020408.2020487. (Cit. on p. 2, DOI 10.1145/2020408.2020487.(CIT.ONP.2, 10.1145]
[4]
[Anonymous], 2015, Keras: Deep Learning for Humans
[5]
[Anonymous], 2015, Randomized response and related methods: Surveying sensitive data
[6]
[Anonymous], 2017, ARXIV170302952
[7]
Local, Private, Efficient Protocols for Succinct Histograms
[J].
STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2015,
:127-135
[8]
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I,
2016, 9985
:635-658