暂无分享,去创建一个
[1] Guy N. Rothblum,et al. Boosting and Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[2] Yann LeCun,et al. Energy-based Generative Adversarial Network , 2016, ICLR.
[3] Koray Kavukcuoglu,et al. Pixel Recurrent Neural Networks , 2016, ICML.
[4] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[5] Wojciech Zaremba,et al. Improved Techniques for Training GANs , 2016, NIPS.
[6] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[7] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[8] Aaron C. Courville,et al. Improved Training of Wasserstein GANs , 2017, NIPS.
[9] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[10] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[11] Cynthia Dwork,et al. Differential privacy and robust statistics , 2009, STOC '09.
[12] George Kurian,et al. Google's Neural Machine Translation System: Bridging the Gap between Human and Machine Translation , 2016, ArXiv.
[13] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[14] Martín Abadi,et al. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data , 2016, ICLR.
[15] Augustus Odena,et al. Semi-Supervised Learning with Generative Adversarial Networks , 2016, ArXiv.
[16] Jian Sun,et al. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[17] Andrew Y. Ng,et al. Reading Digits in Natural Images with Unsupervised Feature Learning , 2011 .
[18] Demis Hassabis,et al. Mastering the game of Go with deep neural networks and tree search , 2016, Nature.
[19] Daan Wierstra,et al. Stochastic Backpropagation and Approximate Inference in Deep Generative Models , 2014, ICML.
[20] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[21] Alex Graves,et al. DRAW: A Recurrent Neural Network For Image Generation , 2015, ICML.
[22] Pramod Viswanath,et al. The Composition Theorem for Differential Privacy , 2013, IEEE Transactions on Information Theory.
[23] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[24] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[25] Carl A. Gunter,et al. Plausible Deniability for Privacy-Preserving Data Synthesis , 2017, Proc. VLDB Endow..
[26] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[27] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[28] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[29] Mikhail Belkin,et al. Learning privately from multiparty data , 2016, ICML.
[30] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[31] Guy N. Rothblum,et al. Concentrated Differential Privacy , 2016, ArXiv.
[32] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[33] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, Allerton.
[34] David Pfau,et al. Unrolled Generative Adversarial Networks , 2016, ICLR.