共 35 条
- [1] Deep Learning with Differential Privacy [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
- [2] Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 635 - 658
- [3] Carlini N, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P267
- [4] Chaudhuri K., 2008, Adv. Neural Inf. Process. Syst., V21, P289
- [5] Chaudhuri K, 2011, J MACH LEARN RES, V12, P1069
- [6] Local Privacy and Statistical Minimax Rates [J]. 2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2013, : 429 - 438
- [7] Calibrating noise to sensitivity in private data analysis [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284
- [8] The Algorithmic Foundations of Differential Privacy [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4): : 211 - 406
- [9] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1322 - 1333
- [10] Differentially Private Empirical Risk Minimization with Input Perturbation [J]. DISCOVERY SCIENCE, DS 2017, 2017, 10558 : 82 - 90