Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning
暂无分享,去创建一个
Somesh Jha | Matt Fredrikson | Irene Giacomelli | Samuel Yeom | Alan Menaged | S. Jha | Matt Fredrikson | Samuel Yeom | I. Giacomelli | Alan Menaged | Irene Giacomelli
[1] Prateek Mittal,et al. Privacy Risks of Securing Machine Learning Models against Adversarial Examples , 2019, CCS.
[2] J. Zico Kolter,et al. Certified Adversarial Robustness via Randomized Smoothing , 2019, ICML.
[3] Michael I. Jordan,et al. Theoretically Principled Trade-off between Robustness and Accuracy , 2019, ICML.
[4] Aleksander Madry,et al. Robustness May Be at Odds with Accuracy , 2018, ICLR.
[5] Aleksander Madry,et al. Adversarially Robust Generalization Requires More Data , 2018, NeurIPS.
[6] J. Zico Kolter,et al. Provable defenses against adversarial examples via the convex outer adversarial polytope , 2017, ICML.
[7] Somesh Jha,et al. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting , 2017, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[8] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[9] Vitaly Shmatikov,et al. Machine Learning Models that Remember Too Much , 2017, CCS.
[10] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[11] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[12] Jeffrey F. Naughton,et al. A Methodology for Formalizing Model-Inversion Attacks , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).
[13] Stephen E. Fienberg,et al. On-Average KL-Privacy and Its Equivalence to Generalization for Max-Entropy Mechanisms , 2016, PSD.
[14] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[15] Raef Bassily,et al. Algorithmic stability for adaptive data analysis , 2015, STOC.
[16] Stephen E. Fienberg,et al. Learning with Differential Privacy: Stability, Learnability and the Sufficiency and Necessity of ERM Principle , 2015, J. Mach. Learn. Res..
[17] Cheng Soon Ong,et al. Multivariate spearman's ρ for aggregating ranks using copulas , 2016 .
[18] Ruxandra F. Olimid,et al. Security of Linear Secret-Sharing Schemes against Mass Surveillance , 2015, IACR Cryptol. ePrint Arch..
[19] C. Bustamante,et al. Privacy Risks from Genomic Data-Sharing Beacons , 2015, American journal of human genetics.
[20] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[21] Mihir Bellare,et al. Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks , 2015, IACR Cryptol. ePrint Arch..
[22] Giuseppe Ateniese,et al. Subversion-Resilient Signature Schemes , 2015, IACR Cryptol. ePrint Arch..
[23] Toniann Pitassi,et al. Generalization in Adaptive Data Analysis and Holdout Reuse , 2015, NIPS.
[24] Denis Nekipelov,et al. Estimation of Treatment Effects from Combined Data: Identification versus Data Security , 2015 .
[25] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[26] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[27] Toniann Pitassi,et al. Preserving Statistical Validity in Adaptive Data Analysis , 2014, STOC.
[28] Giovanni Felici,et al. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers , 2013, Int. J. Secur. Networks.
[29] Denis Nekipelov,et al. Chapter 10 - Estimation of Treatment Effects from Combined Data: Identification versus Data Security / Tatiana Komarova, Denis Nekipelov, and Evgeny Yakovlev , 2015 .
[30] Somesh Jha,et al. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.
[31] Kenneth G. Paterson,et al. Security of Symmetric Encryption against Mass Surveillance , 2014, IACR Cryptol. ePrint Arch..
[32] Ryan O'Donnell,et al. Analysis of Boolean Functions , 2014, ArXiv.
[33] Raef Bassily,et al. Differentially Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds , 2014, 1405.7085.
[34] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[35] Ninghui Li,et al. Membership privacy: a unifying framework for privacy definitions , 2013, CCS.
[36] Adam D. Smith,et al. Differentially Private Feature Selection via Stability Arguments, and the Robustness of the Lasso , 2013, COLT.
[37] Eran Halperin,et al. Identifying Personal Genomes by Surname Inference , 2013, Science.
[38] Adam D. Smith,et al. The Power of Linear Reconstruction Attacks , 2012, SODA.
[39] Sabrina De Capitani di Vimercati,et al. Data Privacy: Definitions and Techniques , 2012, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[40] Kevin P. Murphy,et al. Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.
[41] Yin Yang,et al. Functional Mechanism: Regression Analysis under Differential Privacy , 2012, Proc. VLDB Endow..
[42] Jing Lei,et al. Differentially Private M-Estimators , 2011, NIPS.
[43] B. Malin,et al. Correction: A Systematic Review of Re-Identification Attacks on Health Data , 2015, PloS one.
[44] Graham Cormode,et al. Personal privacy vs population privacy: learning to attack anonymization , 2011, KDD.
[45] Vitaly Shmatikov,et al. "You Might Also Like:" Privacy Risks of Collaborative Filtering , 2011, 2011 IEEE Symposium on Security and Privacy.
[46] Richard Hansen,et al. Enterohepatic Helicobacter in Ulcerative Colitis: Potential Pathogenic Entities? , 2011, PloS one.
[47] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[48] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[49] Adam D. Smith,et al. The price of privately releasing contingency tables and the spectra of random matrices with correlated rows , 2010, STOC '10.
[50] Ohad Shamir,et al. Learnability, Stability and Uniform Convergence , 2010, J. Mach. Learn. Res..
[51] Haixu Tang,et al. Learning your identity and disease from research papers: information leaks in genome wide association study , 2009, CCS.
[52] Michael I. Jordan,et al. Genomic privacy and limits of individual detection in a pool , 2009, Nature Genetics.
[53] R. Altman,et al. Estimation of the warfarin dose with clinical and pharmacogenetic data. , 2009, The New England journal of medicine.
[54] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[55] Marwan Mattar,et al. Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .
[56] Vitaly Shmatikov,et al. The cost of privacy: destruction of data-mining utility in anonymized data publishing , 2008, KDD.
[57] S. Nelson,et al. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.
[58] Cynthia Dwork,et al. The price of privacy and the limits of LP decoding , 2007, STOC '07.
[59] V. Sheffield,et al. Regulation of gene expression in the mammalian eye and its relevance to eye disease , 2006, Proceedings of the National Academy of Sciences.
[60] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[61] Yann LeCun,et al. The mnist database of handwritten digits , 2005 .
[62] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[63] André Elisseeff,et al. Stability and Generalization , 2002, J. Mach. Learn. Res..