共 33 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
[3]
Collobert R, 2011, J MACH LEARN RES, V12, P2493
[5]
Dowlin N, 2016, PR MACH LEARN RES, V48
[6]
Calibrating noise to sensitivity in private data analysis
[J].
THEORY OF CRYPTOGRAPHY, PROCEEDINGS,
2006, 3876
:265-284
[7]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[8]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[9]
Ghazikhani H, 2018, 2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), P1, DOI 10.1109/ICCKE.2018.8566534
[10]
Hamm J, 2016, PR MACH LEARN RES, V48