Accurate Differentially Private Deep Learning on the Edge
暂无分享,去创建一个
Dapeng Wu | Guoren Wang | Chi Harold Liu | Rui Han | Lydia Y. Chen | Dong Li | Junyan Ouyang | D. Wu | Guoren Wang | L. Chen | C. Liu | Rui Han | Dong Li | Junyan Ouyang
[1] Tassilo Klein,et al. Differentially Private Federated Learning: A Client Level Perspective , 2017, ArXiv.
[2] F. Pukelsheim. The Three Sigma Rule , 1994 .
[3] S. Sagar Imambi,et al. PyTorch , 2021, Programming with TensorFlow.
[4] Xu Chen,et al. Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing , 2019, Proceedings of the IEEE.
[5] Gilles Barthe,et al. Privacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences , 2018, NeurIPS.
[6] Michael J. Franklin,et al. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing , 2012, NSDI.
[7] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[8] Rui Han,et al. Accelerating Deep Learning Systems via Critical Set Identification and Model Compression , 2020, IEEE Transactions on Computers.
[9] Jianfeng Zhan,et al. Workload-Adaptive Configuration Tuning for Hierarchical Cloud Schedulers , 2019, IEEE Transactions on Parallel and Distributed Systems.
[10] Dejing Dou,et al. Adaptive Laplace Mechanism: Differential Privacy Preservation in Deep Learning , 2017, 2017 IEEE International Conference on Data Mining (ICDM).
[11] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[12] Yue Zhang,et al. DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive , 2019, IEEE Transactions on Dependable and Secure Computing.
[13] Farinaz Koushanfar,et al. DeepSecure: Scalable Provably-Secure Deep Learning , 2017, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[14] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[15] Tianjian Chen,et al. Federated Machine Learning: Concept and Applications , 2019 .
[16] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[17] Amir Houmansadr,et al. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[18] Richard Nock,et al. Advances and Open Problems in Federated Learning , 2021, Found. Trends Mach. Learn..
[19] Qian Wang,et al. Differentially Private Distributed Online Learning , 2015, IEEE Transactions on Knowledge and Data Engineering.
[20] Ilya Mironov,et al. Differentially private recommender systems: building privacy into the net , 2009, KDD.
[21] Assaf Schuster,et al. Data mining with differential privacy , 2010, KDD.
[22] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[23] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[24] H. Brendan McMahan,et al. Learning Differentially Private Recurrent Language Models , 2017, ICLR.
[25] Bo Chen,et al. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications , 2017, ArXiv.
[26] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[27] Yijun Huang,et al. Asynchronous Parallel Stochastic Gradient for Nonconvex Optimization , 2015, NIPS.
[28] David Evans,et al. Evaluating Differentially Private Machine Learning in Practice , 2019, USENIX Security Symposium.
[29] Raef Bassily,et al. Differentially Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds , 2014, 1405.7085.
[30] Jian Tang,et al. SlimML: Removing Non-Critical Input Data in Large-Scale Iterative Machine Learning , 2019, IEEE Transactions on Knowledge and Data Engineering.
[31] M. Rosenblatt. A CENTRAL LIMIT THEOREM AND A STRONG MIXING CONDITION. , 1956, Proceedings of the National Academy of Sciences of the United States of America.
[32] Alexey Melnikov,et al. The WebSocket Protocol , 2011, RFC.
[33] Jeffrey F. Naughton,et al. Bolt-on Differential Privacy for Scalable Stochastic Gradient Descent-based Analytics , 2016, SIGMOD Conference.
[34] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[35] Vitaly Shmatikov,et al. Exploiting Unintended Feature Leakage in Collaborative Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[36] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[37] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[38] Somesh Jha,et al. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting , 2017, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[39] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[40] Ting Wang,et al. Private, Yet Practical, Multiparty Deep Learning , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[41] Cynthia Dwork,et al. Practical privacy: the SuLQ framework , 2005, PODS.
[42] Yuguang Fang,et al. Preserving Model Privacy for Machine Learning in Distributed Systems , 2018, IEEE Transactions on Parallel and Distributed Systems.
[43] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[44] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[45] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[46] Christof Fetzer,et al. PrivApprox: Privacy-Preserving Stream Analytics , 2019, Informatik Spektrum.
[47] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[48] Trevor Campbell,et al. Coresets for Scalable Bayesian Logistic Regression , 2016, NIPS.
[49] Kin K. Leung,et al. When Edge Meets Learning: Adaptive Control for Resource-Constrained Distributed Machine Learning , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[50] Seunghak Lee,et al. More Effective Distributed ML via a Stale Synchronous Parallel Parameter Server , 2013, NIPS.
[51] Yao Lu,et al. Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..
[52] Stephen E. Fienberg,et al. Learning with Differential Privacy: Stability, Learnability and the Sufficiency and Necessity of ERM Principle , 2015, J. Mach. Learn. Res..
[53] Jiong Jin,et al. Towards Fair and Privacy-Preserving Federated Deep Models , 2019, IEEE Transactions on Parallel and Distributed Systems.
[54] François Fleuret,et al. Not All Samples Are Created Equal: Deep Learning with Importance Sampling , 2018, ICML.