Analyzing User-Level Privacy Attack Against Federated Learning
暂无分享,去创建一个
Zhifei Zhang | Yang Song | Qian Wang | Ju Ren | Zhibo Wang | Mengkai Song | Hairong Qi | H. Qi | Yang Song | Zhifei Zhang | Ju Ren | Zhibo Wang | Qian Wang | Mengkai Song
[1] Yi Yang,et al. A Discriminatively Learned CNN Embedding for Person Reidentification , 2016, ACM Trans. Multim. Comput. Commun. Appl..
[2] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[3] Vitaly Shmatikov,et al. Exploiting Unintended Feature Leakage in Collaborative Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[4] Ivan Beschastnikh,et al. Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting , 2018, ArXiv.
[5] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[6] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[7] Yanjiao Chen,et al. Privacy-Preserving Collaborative Deep Learning With Unreliable Participants , 2020, IEEE Transactions on Information Forensics and Security.
[8] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[9] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[10] Shiho Moriai,et al. Privacy-Preserving Deep Learning: Revisited and Enhanced , 2017, ATIS.
[11] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.
[12] Andrea Vedaldi,et al. Understanding deep image representations by inverting them , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[13] Yann LeCun,et al. The mnist database of handwritten digits , 2005 .
[14] Wojciech Zaremba,et al. Improved Techniques for Training GANs , 2016, NIPS.
[15] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[16] Amir Houmansadr,et al. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[17] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[18] Zhenkai Liang,et al. Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment , 2019, ArXiv.
[19] Xiaogang Wang,et al. Deep Learning Face Representation by Joint Identification-Verification , 2014, NIPS.
[20] Pieter Abbeel,et al. InfoGAN: Interpretable Representation Learning by Information Maximizing Generative Adversarial Nets , 2016, NIPS.
[21] Qian Wang,et al. When Mobile Crowdsensing Meets Privacy , 2019, IEEE Communications Magazine.
[22] Gábor Danner,et al. Fully Distributed Privacy Preserving Mini-batch Gradient Descent Learning , 2015, DAIS.
[23] Andy Harter,et al. Parameterisation of a stochastic model for human face identification , 1994, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision.
[24] Mikhail Belkin,et al. Learning privately from multiparty data , 2016, ICML.
[25] Indranil Gupta,et al. SLSGD: Secure and Efficient Distributed On-device Machine Learning , 2019, ECML/PKDD.
[26] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[27] Qian Wang,et al. Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach , 2019, IEEE Transactions on Dependable and Secure Computing.
[28] Emiliano De Cristofaro,et al. : Membership Inference Attacks Against Generative Models , 2018 .
[29] Sarvar Patel,et al. Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..
[30] Tassilo Klein,et al. Differentially Private Federated Learning: A Client Level Perspective , 2017, ArXiv.
[31] Yang Song,et al. Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning , 2018, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[32] Jonathon Shlens,et al. Conditional Image Synthesis with Auxiliary Classifier GANs , 2016, ICML.
[33] David Wolinsky,et al. Proactively Accountable Anonymous Messaging in Verdict , 2012, USENIX Security Symposium.
[34] Bhiksha Raj,et al. Multiparty Differential Privacy via Aggregation of Locally Trained Classifiers , 2010, NIPS.
[35] Ruby B. Lee,et al. Model inversion attacks against collaborative inference , 2019, ACSAC.
[36] Xiaodong Lin,et al. The Security of Autonomous Driving: Threats, Defenses, and Future Directions , 2020, Proceedings of the IEEE.
[37] Tribhuvanesh Orekondy,et al. Gradient-Leaks: Understanding and Controlling Deanonymization in Federated Learning , 2018 .
[38] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[39] Jakub Konecný,et al. Federated Optimization: Distributed Optimization Beyond the Datacenter , 2015, ArXiv.
[40] Yu Chen,et al. Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications , 2020, IEEE Transactions on Dependable and Secure Computing.
[41] Samy Bengio,et al. Revisiting Distributed Synchronous SGD , 2016, ArXiv.
[42] Emiliano De Cristofaro,et al. LOGAN: Membership Inference Attacks Against Generative Models , 2017, Proc. Priv. Enhancing Technol..