共 40 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
Agarwal N, 2018, ADV NEUR IN, V31
[4]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[5]
Brendan McMahan H., 2018, INT C LEARN REPR
[6]
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I,
2016, 9985
:635-658
[7]
Chen L., 2018, P IEEE C COMM NETW S, P1
[8]
The Algorithmic Foundations of Differential Privacy
[J].
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE,
2013, 9 (3-4)
:211-406
[9]
Folk E., 2019, IOT IS TRANSFORMING
[10]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333