共 15 条
[1]
Understanding Distributed Poisoning Attack in Federated Learning
[J].
2019 IEEE 25TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS),
2019,
:233-239
[2]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[3]
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:603-618
[4]
Krizhevsky Alex, 2009, CsTorontoEdu
[5]
LECUN Y., 2010, MNIST handwritten digit database, DOI DOI 10.1109/PDP.2014.102
[8]
Piplai A., 2020, NATTACK ADVERSARIAL
[9]
Shokri R, 2015, ANN ALLERTON CONF, P909, DOI 10.1109/ALLERTON.2015.7447103
[10]
Sun Y., 2020, IEEE INT C MACH LEAR