Information Stealing in Federated Learning Systems Based on Generative Adversarial Networks
暂无分享,去创建一个
[1] Xiaodong Lin,et al. HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems , 2018, IEEE Transactions on Industrial Informatics.
[2] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[3] Anupam Joshi,et al. NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion , 2020, 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS).
[4] Roland Vollgraf,et al. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms , 2017, ArXiv.
[5] Yuwei Sun,et al. Blockchain-Based Federated Learning Against End-Point Adversarial Data Corruption , 2020, 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA).
[6] Di Cao,et al. Understanding Distributed Poisoning Attack in Federated Learning , 2019, 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS).
[7] Yan Zhang,et al. Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.
[8] Xiang Cheng,et al. PoisonGAN: Generative Poisoning Attacks Against Federated Learning in Edge Computing Systems , 2021, IEEE Internet of Things Journal.
[9] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[10] Jiliang Tang,et al. Adversarial Attacks and Defenses in Images, Graphs and Text: A Review , 2019, International Journal of Automation and Computing.
[11] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[12] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.
[13] Ramesh Raskar,et al. NoPeek: Information leakage reduction to share activations in distributed deep learning , 2020, 2020 International Conference on Data Mining Workshops (ICDMW).
[14] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.