暂无分享,去创建一个
Florian Tramer | Florian Tramèr | Igor Shilov | Karthik Prasad | Mani Malek | Ilya Mironov | Ilya Mironov | Mani Malek | I. Shilov | Karthik Prasad
[1] Aleksandar Nikolov,et al. The geometry of differential privacy: the sparse and approximate cases , 2012, STOC '13.
[2] Amos Beimel,et al. Private Learning and Sanitization: Pure vs. Approximate Differential Privacy , 2013, APPROX-RANDOM.
[3] Miguel Á. Carreira-Perpiñán,et al. Projection onto the probability simplex: An efficient algorithm with a simple proof, and an application , 2013, ArXiv.
[4] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Úlfar Erlingsson,et al. That which we call private , 2019, ArXiv.
[6] Kamalika Chaudhuri,et al. Sample Complexity Bounds for Differentially Private Learning , 2011, COLT.
[7] Toniann Pitassi,et al. Preserving Statistical Validity in Adaptive Data Analysis , 2014, STOC.
[8] Kunal Talwar,et al. Private selection from private candidates , 2018, STOC.
[9] Martín Abadi,et al. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data , 2016, ICLR.
[10] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[11] Di Wang,et al. On Sparse Linear Regression in the Local Differential Privacy Model , 2019, IEEE Transactions on Information Theory.
[12] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[13] Yoram Singer,et al. Efficient projections onto the l1-ball for learning in high dimensions , 2008, ICML '08.
[14] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[15] Jonathan Ullman,et al. Auditing Differentially Private Machine Learning: How Private is Private SGD? , 2020, NeurIPS.
[16] Salil P. Vadhan,et al. The Complexity of Differential Privacy , 2017, Tutorials on the Foundations of Cryptography.
[17] Nikos Komodakis,et al. Wide Residual Networks , 2016, BMVC.
[18] David Berthelot,et al. MixMatch: A Holistic Approach to Semi-Supervised Learning , 2019, NeurIPS.
[19] Úlfar Erlingsson,et al. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks , 2018, USENIX Security Symposium.
[20] Milad Nasr,et al. Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[21] Úlfar Erlingsson,et al. Scalable Private Learning with PATE , 2018, ICLR.
[22] Badih Ghazi,et al. Deep Learning with Label Differential Privacy , 2021, NeurIPS.
[23] David Berthelot,et al. FixMatch: Simplifying Semi-Supervised Learning with Consistency and Confidence , 2020, NeurIPS.
[24] Dong-Hyun Lee,et al. Pseudo-Label : The Simple and Efficient Semi-Supervised Learning Method for Deep Neural Networks , 2013 .
[25] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[26] Samy Bengio,et al. Understanding deep learning requires rethinking generalization , 2016, ICLR.
[27] P. Schwartz. Privacy and Democracy in Cyberspace , 2000 .
[28] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[29] Vitaly Feldman,et al. Does learning require memorization? a short tale about a long tail , 2019, STOC.
[30] Philip Bachman,et al. Learning with Pseudo-Ensembles , 2014, NIPS.
[31] Somesh Jha,et al. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting , 2017, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[32] Quoc V. Le,et al. Randaugment: Practical automated data augmentation with a reduced search space , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[33] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[34] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[35] Yoshua Bengio,et al. A Closer Look at Memorization in Deep Networks , 2017, ICML.
[36] Colin Raffel,et al. Extracting Training Data from Large Language Models , 2020, USENIX Security Symposium.