共 28 条
[1]
Basu S., 2019, ARXIV E PRINTS
[3]
Coates A., 2011, JMLR WORKSHOP C P
[4]
Donahue J, 2014, PR MACH LEARN RES, V32
[5]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[6]
Gaata M., 2016, Int J Mod Trends Eng Res, V3, P213, DOI DOI 10.21884/IJMTER.2016.3068.YIAPY
[7]
Deep Residual Learning for Image Recognition
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:770-778
[9]
Perceptual Losses for Real-Time Style Transfer and Super-Resolution
[J].
COMPUTER VISION - ECCV 2016, PT II,
2016, 9906
:694-711
[10]
King DB, 2015, ACS SYM SER, V1214, P1, DOI 10.1021/bk-2015-1214.ch001