暂无分享,去创建一个
[1] Divesh Srivastava,et al. Differentially Private Spatial Decompositions , 2011, 2012 IEEE 28th International Conference on Data Engineering.
[2] Kalyan Veeramachaneni,et al. Learning Vine Copula Models For Synthetic Data Generation , 2019, AAAI.
[3] S. Srihari. Mixture Density Networks , 1994 .
[4] Koray Kavukcuoglu,et al. Pixel Recurrent Neural Networks , 2016, ICML.
[5] Alex Graves,et al. Conditional Image Generation with PixelCNN Decoders , 2016, NIPS.
[6] Ricard Gavaldà,et al. Generating Synthetic but Plausible Healthcare Record Datasets , 2018, ArXiv.
[7] Roberto Therón,et al. UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs , 2018, Comput. Secur..
[8] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[9] Carlos García Garino,et al. Automatic network intrusion detection: Current techniques and open issues , 2012, Comput. Electr. Eng..
[10] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[11] Mohammad Al-Rubaie,et al. Privacy-Preserving Machine Learning: Threats and Solutions , 2018, IEEE Security & Privacy.
[12] Daniel S. Berman,et al. A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..
[13] Lei Xu,et al. Modeling Tabular data using Conditional GAN , 2019, NeurIPS.
[14] Philip S. Yu,et al. A General Survey of Privacy-Preserving Data Mining Models and Algorithms , 2008, Privacy-Preserving Data Mining.
[15] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[16] Jinoh Kim,et al. A survey of deep learning-based network anomaly detection , 2017, Cluster Computing.
[17] Sushil Jajodia,et al. Data Synthesis based on Generative Adversarial Networks , 2018, Proc. VLDB Endow..
[18] Shukor Abd Razak,et al. Data Anonymization Using Pseudonym System to Preserve Data Privacy , 2020, IEEE Access.
[19] Lei Xu,et al. Modeling Tabular Data using Conditional GAN , 2019 .