共 38 条
- [2] [Anonymous], 2016, WORKSH PRIV MULT MAC
- [3] [Anonymous], 2018, CORR
- [4] Practical Secure Aggregation for Privacy-Preserving Machine Learning [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1175 - 1191
- [5] Briggs C., 2020, IEEE IJCNN, P1, DOI DOI 10.1109/IJCNN48605.2020.9207469
- [6] Chen Fei, 2018, ABS180207876 CORR
- [7] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1322 - 1333
- [8] Fredrikson M, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P17
- [9] Ghifary M, 2014, LECT NOTES ARTIF INT, V8862, P898, DOI 10.1007/978-3-319-13560-1_76
- [10] Gong BQ, 2012, PROC CVPR IEEE, P2066, DOI 10.1109/CVPR.2012.6247911