暂无分享,去创建一个
Kamalika Chaudhuri | James Zou | James Y. Zou | Zachary Izzo | Mary Anne Smart | Mary Anne Smart | Kamalika Chaudhuri | Zachary Izzo
[1] Luca Antiga,et al. Automatic differentiation in PyTorch , 2017 .
[2] Gert Cauwenberghs,et al. Incremental and Decremental Support Vector Machine Learning , 2000, NIPS.
[3] Mario Fritz,et al. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models , 2018, NDSS.
[4] Richard S. Zemel,et al. Understanding the Origins of Bias in Word Embeddings , 2018, ICML.
[5] Alex Krizhevsky,et al. One weird trick for parallelizing convolutional neural networks , 2014, ArXiv.
[6] Victor Y. Pan,et al. The complexity of the matrix eigenproblem , 1999, STOC '99.
[7] Percy Liang,et al. On the Accuracy of Influence Functions for Measuring Group Effects , 2019, NeurIPS.
[8] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[9] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[10] James Zou,et al. Making AI Forget You: Data Deletion in Machine Learning , 2019, NeurIPS.
[11] Junfeng Yang,et al. Towards Making Systems Forget with Machine Unlearning , 2015, 2015 IEEE Symposium on Security and Privacy.
[12] Kevin P. Murphy,et al. Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.
[13] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[14] S. Weisberg,et al. Residuals and Influence in Regression , 1982 .
[15] Michael I. Jordan,et al. A Swiss Army Infinitesimal Jackknife , 2018, AISTATS.
[16] Cheng-Hao Tsai,et al. Incremental and decremental training for linear classification , 2014, KDD.
[17] Vitaly Shmatikov,et al. Auditing Data Provenance in Text-Generation Models , 2018, KDD.
[18] Somesh Jha,et al. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.
[19] Percy Liang,et al. Understanding Black-box Predictions via Influence Functions , 2017, ICML.
[20] Vitaly Shmatikov,et al. Overlearning Reveals Sensitive Attributes , 2019, ICLR.
[21] Úlfar Erlingsson,et al. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks , 2018, USENIX Security Symposium.
[22] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[23] Tom Goldstein,et al. Certified Data Removal from Machine Learning Models , 2020, ICML.
[24] Dawn Song,et al. The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).