暂无分享,去创建一个
Sushil Jajodia | Noseong Park | Hongkyu Park | Youngmin Kim | Mahmoud Mohammadi | Kshitij Gorde | S. Jajodia | Noseong Park | Youngmin Kim | Mahmoud Mohammadi | Kshitij Gorde | Hongkyu Park
[1] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[2] Andrew L. Maas. Rectifier Nonlinearities Improve Neural Network Acoustic Models , 2013 .
[3] Josep Domingo-Ferrer,et al. Outlier Protection in Continuous Microdata Masking , 2004, Privacy in Statistical Databases.
[4] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[5] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[6] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[7] Sixin Zhang,et al. Distributed Stochastic Optimization for Deep Learning , 2016 .
[8] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[9] Jonathon Shlens,et al. Conditional Image Synthesis with Auxiliary Classifier GANs , 2016, ICML.
[10] Lorenzo Rosasco,et al. Are Loss Functions All the Same? , 2004, Neural Computation.
[11] Philip S. Yu,et al. A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.
[12] Sixin Zhang,et al. Distributed stochastic optimization for deep learning (thesis) , 2016, ArXiv.
[13] Jaakko Lehtinen,et al. Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.
[14] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[15] Josep Domingo-Ferrer,et al. A Survey of Inference Control Methods for Privacy-Preserving Data Mining , 2008, Privacy-Preserving Data Mining.
[16] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[17] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[18] Gilles Louppe,et al. Independent consultant , 2013 .
[19] Jimeng Sun,et al. Generating Multi-label Discrete Patient Records using Generative Adversarial Networks , 2017, MLHC.
[20] Léon Bottou,et al. Towards Principled Methods for Training Generative Adversarial Networks , 2017, ICLR.
[21] Stephen P. Boyd,et al. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..
[22] JajodiaSushil,et al. Data synthesis based on generative adversarial networks , 2018, VLDB 2018.
[23] Philip S. Yu,et al. Differentially private data release for data mining , 2011, KDD.
[24] Mani B. Srivastava,et al. SenseGen: A deep learning architecture for synthetic sensor data generation , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[25] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[26] Khaled El Emam,et al. A method for evaluating marketer re-identification risk , 2010, EDBT '10.
[27] Vitaly Shmatikov,et al. The cost of privacy: destruction of data-mining utility in anonymized data publishing , 2008, KDD.
[28] Jimeng Sun,et al. Generating Multi-label Discrete Electronic Health Records using Generative Adversarial Networks , 2017, ArXiv.
[29] Farshad Fotouhi,et al. Assessing global disclosure risk in masked microdata , 2004, WPES '04.
[30] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[31] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.