Membership Inference Attack Using Self Influence Functions
暂无分享,去创建一个
[1] Linpeng Huang,et al. Resolving Training Biases via Influence-based Data Relabeling , 2022, ICLR.
[2] Shahbaz Rezaei,et al. On the Difficulty of Membership Inference Attacks , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[3] Kristian Kersting,et al. Right for Better Reasons: Training Differentiable Models by Constraining their Influence Functions , 2021, AAAI.
[4] K. Murphy,et al. Deep Learning for Chest X-ray Analysis: A Survey , 2021, Medical Image Anal..
[5] Nicolas Papernot,et al. Label-Only Membership Inference Attacks , 2020, ICML.
[6] Yang Zhang,et al. Label-Leaks: Membership Inference Attack with Label , 2020, ArXiv.
[7] Shuang Yang,et al. QEBA: Query-Efficient Boundary-Based Blackbox Attack , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[8] Ninghui Li,et al. Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap , 2020, ArXiv.
[9] Frederick Liu,et al. Estimating Training Data Influence by Tracking Gradient Descent , 2020, NeurIPS.
[10] G. Sapiro,et al. Detecting Adversarial Samples Using Influence Functions and Nearest Neighbors , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[11] Matt Fredrikson,et al. Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference , 2019, USENIX Security Symposium.
[12] Michael I. Jordan,et al. HopSkipJumpAttack: A Query-Efficient Decision-Based Attack , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[13] N. Gong,et al. MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples , 2019, CCS.
[14] Cordelia Schmid,et al. White-box vs Black-box: Bayes Optimal Strategies for Membership Inference , 2019, ICML.
[15] Prateek Mittal,et al. Privacy Risks of Securing Machine Learning Models against Adversarial Examples , 2019, CCS.
[16] Arvid Lundervold,et al. An overview of deep learning in medical imaging focusing on MRI , 2018, Zeitschrift fur medizinische Physik.
[17] Mario Fritz,et al. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models , 2018, NDSS.
[18] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[19] Reza Shokri,et al. Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks , 2018, ArXiv.
[20] Martin Wistuba,et al. Adversarial Robustness Toolbox v1.0.0 , 2018, 1807.01069.
[21] Reza Shokri,et al. Machine Learning with Membership Privacy using Adversarial Regularization , 2018, CCS.
[22] Somesh Jha,et al. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting , 2017, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[23] Victor-Emil Neagoe,et al. Data Mining and Machine Learning for Financial Analysis , 2017 .
[24] Percy Liang,et al. Understanding Black-box Predictions via Influence Functions , 2017, ICML.
[25] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[26] Naman Agarwal,et al. Second Order Stochastic Optimization in Linear Time , 2016, ArXiv.
[27] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[28] Miriam A. M. Capretz,et al. MLaaS: Machine Learning as a Service , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).
[29] Ya Le,et al. Tiny ImageNet Visual Recognition Challenge , 2015 .
[30] Ming Yang,et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[31] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[32] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[33] S. Weisberg,et al. Residuals and Influence in Regression , 1982 .