共 43 条
[11]
Chen C., 2019, IEEE Trans. Inf. Forensics Security, early access, DOI [10.1109/TIFS.2019.2945198, DOI 10.1109/TIFS.2019.2945198]
[13]
Diakonikolas I, 2019, PR MACH LEARN RES, V97
[15]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[16]
STRIP: A Defence Against Trojan Attacks on Deep Neural Networks
[J].
35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA),
2019,
:113-125
[17]
Goodfellow I., 2020, ADV NEUR IN, V63, P139, DOI [DOI 10.1145/3422622, 10.1145/3422622]
[18]
Gu Tianyu, 2017, P MACH LEARN COMP SE
[19]
Gulrajani I., 2017, ADV NEURAL INFPROCES, P5767
[20]
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:603-618