暂无分享,去创建一个
[1] Ricardo A. Calix,et al. On the feasibility of an embedded machine learning processor for intrusion detection , 2016, 2016 IEEE International Conference on Big Data (Big Data).
[2] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[3] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[4] Blaise Agüera y Arcas,et al. Federated Learning of Deep Networks using Model Averaging , 2016, ArXiv.
[5] Timothy W. Finin,et al. Semantic approach to automating management of big data privacy policies , 2016, 2016 IEEE International Conference on Big Data (Big Data).
[6] Alfredo Cuzzocrea,et al. Private databases on the cloud: Models, issues and research perspectives , 2016, 2016 IEEE International Conference on Big Data (Big Data).
[7] Sandra Servia Rodríguez,et al. Personal Model Training under Privacy Constraints , 2017, ArXiv.
[8] Byung-Gon Chun,et al. Augmented Smartphone Applications Through Clone Cloud Execution , 2009, HotOS.
[9] Bo Chen,et al. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications , 2017, ArXiv.
[10] H. T. Kung,et al. Distributed Deep Neural Networks Over the Cloud, the Edge and End Devices , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[11] Martín Abadi,et al. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data , 2016, ICLR.
[12] Richard Mortier,et al. Probabilistic Synchronous Parallel , 2017, ArXiv.
[13] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[14] Ke Xu,et al. Cleaning the Null Space: A Privacy Mechanism for Predictors , 2017, AAAI.
[15] Florence March,et al. 2016 , 2016, Affair of the Heart.
[16] Yadu N. Babuji,et al. Cloud Kotta: Enabling secure and scalable data analytics in the cloud , 2016, 2016 IEEE International Conference on Big Data (Big Data).
[17] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[18] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[19] Liang Wang. Owl: A General-Purpose Numerical Library in OCaml , 2017, ArXiv.
[20] Fang Liu,et al. Enterprise data breach: causes, challenges, prevention, and future directions , 2017, WIREs Data Mining Knowl. Discov..
[21] Alexander Gruenstein,et al. Accurate and compact large vocabulary speech recognition on mobile devices , 2013, INTERSPEECH.
[22] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[23] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[24] Mike Schuster,et al. Speech Recognition for Mobile Devices at Google , 2010, PRICAI.
[25] Yixin Chen,et al. Compressing Neural Networks with the Hashing Trick , 2015, ICML.
[26] Trevor N. Mudge,et al. Neurosurgeon: Collaborative Intelligence Between the Cloud and Mobile Edge , 2017, ASPLOS.
[27] Jussi Kangasharju,et al. Kvasir: Scalable Provision of Semantically Relevant Web Content on Big Data Framework , 2016, IEEE Transactions on Big Data.
[28] Chunyan Miao,et al. Crowdsensing Air Quality with Camera-Enabled Mobile Devices , 2017, AAAI.
[29] Xin Zhang,et al. End to End Learning for Self-Driving Cars , 2016, ArXiv.