共 57 条
- [31] Dwork C, 2009, ACM S THEORY COMPUT, P371
- [32] Dwork Cynthia, 2016, CORR
- [33] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1322 - 1333
- [34] Goodfellow I., 2015, C o R R , abs/ 1510. 01799v2
- [35] GRAHAM B, 2014, CORR
- [36] Gupta A, 2010, PROC APPL MATH, V135, P1106
- [37] Ierusalimschy R, 1996, SOFTWARE PRACT EXPER, V26, P635, DOI 10.1002/(SICI)1097-024X(199606)26:6<635::AID-SPE26>3.0.CO
- [38] 2-P
- [39] What is the Best Multi-Stage Architecture for Object Recognition? [J]. 2009 IEEE 12TH INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2009, : 2146 - 2153
- [40] Kairouz P, 2015, PR MACH LEARN RES, V37, P1376