共 27 条
[1]
Lipton ZC, 2015, Arxiv, DOI arXiv:1506.00019
[2]
Dewar RS, 2014, INT CONF CYBER CONFL, P7, DOI 10.1109/CYCON.2014.6916392
[3]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[4]
GTSC, 2019, JORDANIAN CITIZEN CE
[5]
Atli BG, 2020, Arxiv, DOI arXiv:1910.05429
[6]
Jia JY, 2019, Arxiv, DOI arXiv:1909.10594
[8]
Juuti M, 2019, Arxiv, DOI arXiv:1805.02628
[9]
Khrisha K., 2020, STEAL MODERN NLP SYS
[10]
Lee TS, 2018, Arxiv, DOI arXiv:1806.00054