共 44 条
- [1] Aggarwal Charu C, 2008, A general survey of privacy-preserving data mining models and algorithms
- [2] Alpaydin E, 2014, ADAPT COMPUT MACH LE, P115
- [3] [Anonymous], 2017, DATA LEAKAGE HEALTHC
- [4] [Anonymous], 2007, Tech. rep
- [5] Machine Learning Classification over Encrypted Data [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [6] Distributed optimization and statistical learning via the alternating direction method of multipliers [J]. Foundations and Trends in Machine Learning, 2010, 3 (01): : 1 - 122
- [8] Chu CK, 2005, LECT NOTES COMPUT SC, V3386, P172
- [9] Forero PA, 2010, J MACH LEARN RES, V11, P1663
- [10] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1322 - 1333