暂无分享,去创建一个
Yingzhe He | Kai Chen | Guozhu Meng | Jinwen He | Xingbo Hu | Yingzhe He | Kai Chen | Xingbo Hu | Jinwen He | Guozhu Meng
[1] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[2] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[3] Sebastian Schelter,et al. "Amnesia" - Machine Learning Models That Can Forget User Data Very Fast , 2020, CIDR.
[4] David A. Landgrebe,et al. A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..
[5] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[6] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[7] Percy Liang,et al. Understanding Black-box Predictions via Influence Functions , 2017, ICML.
[8] James Zou,et al. Making AI Forget You: Data Deletion in Machine Learning , 2019, NeurIPS.
[9] Yinjun Wu,et al. DeltaGrad: Rapid retraining of machine learning models , 2020, ICML.
[10] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[11] Claudia Eckert,et al. Adversarial Label Flips Attack on Support Vector Machines , 2012, ECAI.
[12] Michael McCloskey,et al. Catastrophic Interference in Connectionist Networks: The Sequential Learning Problem , 1989 .
[13] Yingzhe He,et al. Towards Security Threats of Deep Learning Systems: A Survey , 2020, IEEE Transactions on Software Engineering.
[14] Úlfar Erlingsson,et al. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks , 2018, USENIX Security Symposium.
[15] Sanjam Garg,et al. Formalizing Data Deletion in the Context of the Right to Be Forgotten , 2020, IACR Cryptol. ePrint Arch..
[16] Ron Mancini,et al. Op Amps for Everyone , 2003 .
[17] L. V. D. Maaten,et al. Certified Data Removal from Machine Learning Models , 2019, ICML.
[18] Yingzhe He,et al. DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks , 2021, USENIX Security Symposium.
[19] Andrew Y. Ng,et al. Reading Digits in Natural Images with Unsupervised Feature Learning , 2011 .
[20] Agustí Verde Parera,et al. General data protection regulation , 2018 .
[21] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[22] Simon Haykin,et al. GradientBased Learning Applied to Document Recognition , 2001 .
[23] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[24] Xiaolu Wang,et al. Explaining Concept Drift of Deep Learning Models , 2019, CSS.
[25] C. Peng,et al. Mosaic organization of DNA nucleotides. , 1994, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[26] Matthias Zeppelzauer,et al. Machine Unlearning: Linear Filtration for Logit-based Classifiers , 2020, ArXiv.
[27] Yann LeCun,et al. The mnist database of handwritten digits , 2005 .
[28] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[29] David Evans,et al. Evaluating Differentially Private Machine Learning in Practice , 2019, USENIX Security Symposium.
[30] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[31] Song Han,et al. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding , 2015, ICLR.
[32] Bernard Ans,et al. Neural networks with a self-refreshing memory: Knowledge transfer in sequential learning tasks without catastrophic forgetting , 2000, Connect. Sci..
[33] Sepp Hochreiter,et al. The Vanishing Gradient Problem During Learning Recurrent Neural Nets and Problem Solutions , 1998, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[34] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[35] Ethan Stump,et al. Reduction of catastrophic forgetting with transfer learning and ternary output codes , 2015, 2015 International Joint Conference on Neural Networks (IJCNN).
[36] Geoffrey I. Webb,et al. Characterizing concept drift , 2015, Data Mining and Knowledge Discovery.
[37] Junfeng Yang,et al. Towards Making Systems Forget with Machine Unlearning , 2015, 2015 IEEE Symposium on Security and Privacy.
[38] Yoshua Bengio,et al. A Closer Look at Memorization in Deep Networks , 2017, ICML.
[39] Yomi Kastro,et al. Real-time prediction of online shoppers’ purchasing intention using multilayer perceptron and LSTM recurrent neural networks , 2019, Neural Computing and Applications.
[40] S. Weisberg,et al. Characterizations of an Empirical Influence Function for Detecting Influential Cases in Regression , 1980 .
[41] R Ratcliff,et al. Connectionist models of recognition memory: constraints imposed by learning and forgetting functions. , 1990, Psychological review.
[42] David M. Sommer,et al. Towards Probabilistic Verification of Machine Unlearning , 2020, ArXiv.
[43] Chang Liu,et al. Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[44] Johan A. K. Suykens,et al. Least Squares Support Vector Machine Classifiers , 1999, Neural Processing Letters.
[45] Tudor Dumitras,et al. Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks , 2018, NeurIPS.
[46] S. Weisberg,et al. Residuals and Influence in Regression , 1982 .
[47] Yizhen Wang,et al. Data Poisoning Attacks against Online Learning , 2018, ArXiv.
[48] Cheng-Hao Tsai,et al. Incremental and decremental training for linear classification , 2014, KDD.
[49] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[50] Stefano Soatto,et al. Eternal Sunshine of the Spotless Net: Selective Forgetting in Deep Networks , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[51] David Lie,et al. Machine Unlearning , 2019, 2021 IEEE Symposium on Security and Privacy (SP).
[52] Jianfeng Ma,et al. Learn to Forget: User-Level Memorization Elimination in Federated Learning , 2020, ArXiv.