共 64 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[3]
[Anonymous], 2008, Technical Report MSR-TR-2008-35
[4]
Aslett LJM, 2015, Arxiv, DOI [arXiv:1508.06574, 10.48550/arXiv.1508.06574, DOI 10.48550/ARXIV.1508.06574]
[5]
Bebensee B., 2019, arXiv
[6]
Ben-Israel A., 2003, Generalized inverses: theory and applications, V15
[7]
Combining geometry and combinatorics: a unified approach to sparse signal recovery
[J].
2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3,
2008,
:798-+
[8]
Berr Jonathan, 2018, EQUIFAX BREACH EXPOS
[10]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191