暂无分享,去创建一个
Hailong Yang | Ruiyuan Gao | Depei Qian | Ming Dun | Zhongzhi Luan | D. Qian | Hailong Yang | Zhongzhi Luan | Ruiyuan Gao | Ming Dun
[1] Hadi Esmaeilzadeh,et al. Shredder: Learning Noise Distributions to Protect Inference Privacy , 2020, ASPLOS.
[2] Lei Ying,et al. On the relation between identifiability, differential privacy, and mutual-information privacy , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[3] Ahmad-Reza Sadeghi,et al. Secure Multiparty Computation from SGX , 2017, Financial Cryptography.
[4] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[5] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[6] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[7] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[8] Balachander Krishnamurthy,et al. Privacy awareness about information leakage: who knows what about me? , 2013, WPES.
[9] Peng Liu,et al. Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms , 2018, USENIX Security Symposium.
[10] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[11] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[12] Ninghui Li,et al. Privacy at Scale: Local Dierential Privacy in Practice , 2018 .
[13] Hamed Haddadi,et al. Deep Private-Feature Extraction , 2018, IEEE Transactions on Knowledge and Data Engineering.
[14] Yao Lu,et al. Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..
[15] Renato Renner,et al. An intuitive proof of the data processing inequality , 2011, Quantum Inf. Comput..
[16] Kamila Nieradzinska,et al. Pervasive eHealth services a security and privacy risk awareness survey , 2016, 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA).
[17] Baoyuan Wu,et al. Tencent ML-Images: A Large-Scale Multi-Label Image Database for Visual Representation Learning , 2019, IEEE Access.
[18] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[19] Naftali Tishby,et al. Opening the Black Box of Deep Neural Networks via Information , 2017, ArXiv.
[20] ZissermanAndrew,et al. The Pascal Visual Object Classes Challenge , 2015 .
[21] Sarvar Patel,et al. Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..
[22] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).