暂无分享,去创建一个
Josep Domingo-Ferrer | Alberto Blanco-Justicia | Kuan Eeik Tan | Adrian Flanagan | Sergio Mart'inez | David S'anchez | Adrian Flanagan | K. E. Tan | Alberto Blanco-Justicia | J. Domingo-Ferrer | Sergio Mart'inez | David Sánchez
[1] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[2] Tong Zhang,et al. Solving large scale linear prediction problems using stochastic gradient descent algorithms , 2004, ICML.
[3] Simon Haykin,et al. Neural Networks and Learning Machines , 2010 .
[4] Léon Bottou,et al. Large-Scale Machine Learning with Stochastic Gradient Descent , 2010, COMPSTAT.
[5] C. Dwork. A firm foundation for private data analysis , 2011, Commun. ACM.
[6] Peter J. Haas,et al. Large-scale matrix factorization with distributed stochastic gradient descent , 2011, KDD.
[7] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[8] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[9] Josep Domingo-Ferrer,et al. Privacy and Data Protection by Design - from policy to engineering , 2014, ArXiv.
[10] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[11] Josep Domingo-Ferrer,et al. Self-enforcing protocols via co-utile reputation management , 2016, Inf. Sci..
[12] Wojciech Zaremba,et al. Improved Techniques for Training GANs , 2016, NIPS.
[13] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[14] Tapani Raiko,et al. International Conference on Learning Representations (ICLR) , 2016 .
[15] Josep Domingo-Ferrer,et al. Co-Utility: Self-Enforcing protocols for the mutual benefit of participants , 2017, Eng. Appl. Artif. Intell..
[16] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.
[17] Juha Nurmi,et al. Tor De-anonymisation Techniques , 2017, NSS.
[18] Rachid Guerraoui,et al. Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent , 2017, NIPS.
[19] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[20] Sarvar Patel,et al. Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..
[21] Kannan Ramchandran,et al. Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates , 2018, ICML.
[22] Gaurav Kapoor,et al. Protection Against Reconstruction and Its Applications in Private Federated Learning , 2018, ArXiv.
[23] H. Brendan McMahan,et al. A General Approach to Adding Differential Privacy to Iterative Training Procedures , 2018, ArXiv.
[24] Vitaly Shmatikov,et al. Exploiting Unintended Feature Leakage in Collaborative Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[25] Yang Song,et al. Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning , 2018, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[26] B. Faltings,et al. Federated Learning with Bayesian Differential Privacy , 2019, 2019 IEEE International Conference on Big Data (Big Data).
[27] Prateek Mittal,et al. Analyzing Federated Learning through an Adversarial Lens , 2018, ICML.
[28] Hubert Eichner,et al. Towards Federated Learning at Scale: System Design , 2019, SysML.
[29] Lili Su,et al. Distributed Statistical Machine Learning in Adversarial Settings: Byzantine Gradient Descent , 2019, PERV.
[30] Joseph Dureau,et al. Federated Learning for Keyword Spotting , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[31] Kuan Eeik Tan,et al. Federated Collaborative Filtering for Privacy-Preserving Personalized Recommendation System , 2019, ArXiv.
[32] Tian Li,et al. Fair Resource Allocation in Federated Learning , 2019, ICLR.
[33] H. Vincent Poor,et al. Federated Learning With Differential Privacy: Algorithms and Performance Analysis , 2019, IEEE Transactions on Information Forensics and Security.
[34] Kuan Eeik Tan,et al. Federated Multi-view Matrix Factorization for Personalized Recommendations , 2020, ECML/PKDD.
[35] Richard Nock,et al. Advances and Open Problems in Federated Learning , 2019, Found. Trends Mach. Learn..
[36] Josep Domingo-Ferrer,et al. The limits of differential privacy (and its misuse in data release and machine learning) , 2020, Commun. ACM.
[37] Peter B. Walker,et al. Federated Learning for Healthcare Informatics , 2019, Journal of Healthcare Informatics Research.