共 22 条
[2]
Alistarh D., 2017, ADV NEURAL INFORMA T
[3]
Caldas S., 2018, ARXIV181207210
[4]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[5]
Fredrikson M, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P17
[6]
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:619-633
[7]
Hard Andrew, 2018, P 2018 C EMPIRICAL M
[9]
Karimireddy Sai Praneeth, 2019, CoRR, abs/1910.06378
[10]
Konecny J., 2016, P NIPS WORKSH PRIV M