共 45 条
- [12] Chang Wei-Cheng, 2020, ARXIV200108737
- [13] Chen Xiangyi, 2020, ADV NEURAL INFORM PR, V33, P13773
- [16] The Algorithmic Foundations of Differential Privacy [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4): : 211 - 406
- [17] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1322 - 1333
- [18] HYBRID DETERMINISTIC-STOCHASTIC METHODS FOR DATA FITTING [J]. SIAM JOURNAL ON SCIENTIFIC COMPUTING, 2012, 34 (03) : A1380 - A1405
- [19] Gandikota V., 2019, ARXIV191107971
- [20] Kairouz P., 2019, ARXIV191204977