Privacy-Preserving Deep Learning: A Comprehensive Survey

[1]  J. Morton,et al.  Snowmobile effects on height and live stem abundance of wetland shrubs in south-central Alaska , 2021 .

[2]  Van-Nam Huynh,et al.  An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation , 2021, Neurocomputing.

[3]  Marcel Keller,et al.  MP-SPDZ: A Versatile Framework for Multi-Party Computation , 2020, IACR Cryptol. ePrint Arch..

[4]  Chenyu Shi,et al.  Secure Collaborative Training and Inference for XGBoost , 2020, PPMLP@CCS.

[5]  D. Gregovich,et al.  Steep and deep: Terrain and climate factors explain brown bear (Ursus arctos) alpine den site selection to guide heli-skiing management , 2020, PloS one.

[6]  Daniel Hurtado Ram'irez,et al.  Privacy Preserving K-Means Clustering: A Secure Multi-Party Computation Approach , 2020, ArXiv.

[7]  Daniel Rueckert,et al.  Robust Aggregation for Adaptive Privacy Preserving Federated Learning in Healthcare , 2020, ArXiv.

[8]  Jean-Pierre Hubaux,et al.  POSEIDON: Privacy-Preserving Federated Neural Network Learning , 2020, NDSS.

[9]  Yingjie Wang,et al.  A privacy-preserving mechanism based on local differential privacy in edge computing , 2020, China Communications.

[10]  Mark Last,et al.  CryptoRNN - Privacy-Preserving Recurrent Neural Networks Using Homomorphic Encryption , 2020, CSCML.

[11]  Rickmer Braren,et al.  Secure, privacy-preserving and federated machine learning in medical imaging , 2020, Nature Machine Intelligence.

[12]  Huaqun Wang,et al.  A Privacy-Preserving and Verifiable Federated Learning Scheme , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).

[13]  Tao Xiang,et al.  A training-integrity privacy-preserving federated learning scheme with trusted execution environment , 2020, Inf. Sci..

[14]  Zhong Fan,et al.  A Review of Privacy-Preserving Federated Learning for the Internet-of-Things , 2020 .

[15]  Abdelouahid Derhab,et al.  A review of privacy-preserving techniques for deep learning , 2020, Neurocomputing.

[16]  James J. Q. Yu,et al.  Privacy-Preserving Traffic Flow Prediction: A Federated Learning Approach , 2020, IEEE Internet of Things Journal.

[17]  Jung Hee Cheon,et al.  HE-Friendly Algorithm for Privacy-Preserving SVM Training , 2020, IEEE Access.

[18]  Sotiris Ioannidis,et al.  TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud , 2020, CODASPY.

[19]  Lalana Kagal,et al.  PrivacyFL: A Simulator for Privacy-Preserving and Secure Federated Learning , 2020, CIKM.

[20]  Maoguo Gong,et al.  Preserving differential privacy in deep neural networks with relevance-based adaptive noise imposition , 2020, Neural Networks.

[21]  Natalia Gimelshein,et al.  PyTorch: An Imperative Style, High-Performance Deep Learning Library , 2019, NeurIPS.

[22]  Weijie J. Su,et al.  Deep Learning with Gaussian Differential Privacy , 2019, Harvard data science review.

[23]  Ananda Theertha Suresh,et al.  Can You Really Backdoor Federated Learning? , 2019, ArXiv.

[24]  Yu Zhou,et al.  Privacy Preserving Distributed Data Mining Based on Secure Multi-party Computation , 2019, 2019 IEEE 11th International Conference on Advanced Infocomm Technology (ICAIT).

[25]  Jacob S. Ivan,et al.  Winter recreation and Canada lynx: reducing conflict through niche partitioning , 2019, Ecosphere.

[26]  Aseem Rastogi,et al.  CrypTFlow: Secure TensorFlow Inference , 2019, 2020 IEEE Symposium on Security and Privacy (SP).

[27]  Sameer Wagh,et al.  SecureNN: 3-Party Secure Computation for Neural Network Training , 2019, Proc. Priv. Enhancing Technol..

[28]  Jiong Jin,et al.  Towards Fair and Privacy-Preserving Federated Deep Models , 2019, IEEE Transactions on Parallel and Distributed Systems.

[29]  Shiho Moriai,et al.  Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2019, 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH).

[30]  Nicolas Gama,et al.  TFHE: Fast Fully Homomorphic Encryption Over the Torus , 2019, Journal of Cryptology.

[31]  Chao Li,et al.  CryptoNN: Training Neural Networks over Encrypted Data , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[32]  Wei Zhang,et al.  Differential Privacy Preservation in Deep Learning: Challenges, Opportunities and Solutions , 2019, IEEE Access.

[33]  Guosheng Lin,et al.  On lightweight privacy-preserving collaborative learning for internet-of-things objects , 2019, IoTDI.

[34]  Hubert Eichner,et al.  Towards Federated Learning at Scale: System Design , 2019, SysML.

[35]  Amir Salman Avestimehr,et al.  CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning , 2019, IEEE Journal on Selected Areas in Information Theory.

[36]  Joseph D. Holbrook,et al.  Wolverines in winter: indirect habitat loss and functional responses to backcountry recreation , 2019, Ecosphere.

[37]  Rui Zhang,et al.  A Hybrid Approach to Privacy-Preserving Federated Learning , 2018, Informatik Spektrum.

[38]  Yang Song,et al.  Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning , 2018, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[39]  G. Wittemyer,et al.  Modeling anthropogenic noise impacts on animals in natural areas , 2018, Landscape and Urban Planning.

[40]  Li Fei-Fei,et al.  Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference , 2018, ArXiv.

[41]  Daniel Rueckert,et al.  A generic framework for privacy preserving deep learning , 2018, ArXiv.

[42]  Peter Rindal,et al.  ABY3: A Mixed Protocol Framework for Machine Learning , 2018, IACR Cryptol. ePrint Arch..

[43]  Xiaoqian Jiang,et al.  Secure Outsourced Matrix Computation and Application to Neural Networks , 2018, CCS.

[44]  Xu An Wang,et al.  Privacy-Preserving All Convolutional Net Based on Homomorphic Encryption , 2018, NBiS.

[45]  Pascal Paillier,et al.  Fast Homomorphic Evaluation of Deep Discretized Neural Networks , 2018, IACR Cryptol. ePrint Arch..

[46]  Thomas F. Wenisch,et al.  Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.

[47]  Jacob S. Ivan,et al.  Sharing the same slope: Behavioral responses of a threatened mesocarnivore to motorized and nonmotorized winter recreation , 2018, Ecology and evolution.

[48]  Varun Kanade,et al.  TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service , 2018, ICML.

[49]  Dan Boneh,et al.  Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware , 2018, ICLR.

[50]  Mario Fritz,et al.  ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models , 2018, NDSS.

[51]  Zheng Huang,et al.  Distributed Large Scale Privacy-Preserving Deep Mining , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).

[52]  Guocong Song,et al.  Collaborative Learning for Deep Neural Networks , 2018, NeurIPS.

[53]  Jung Hee Cheon,et al.  Bootstrapping for Approximate Homomorphic Encryption , 2018, IACR Cryptol. ePrint Arch..

[54]  K. Elder,et al.  Snowmobile impacts on snowpack physical and mechanical properties , 2018 .

[55]  Vitaly Shmatikov,et al.  Chiron: Privacy-preserving Machine Learning as a Service , 2018, ArXiv.

[56]  Torsten Hoefler,et al.  Demystifying Parallel and Distributed Deep Learning , 2018, ACM Comput. Surv..

[57]  Laurence T. Yang,et al.  Secure weighted possibilistic c-means algorithm on cloud for clustering big data , 2018, Inf. Sci..

[58]  Anantha Chandrakasan,et al.  Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..

[59]  Reza Shokri,et al.  Machine Learning with Membership Privacy using Adversarial Regularization , 2018, CCS.

[60]  Farinaz Koushanfar,et al.  Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications , 2018, IACR Cryptol. ePrint Arch..

[61]  Jung Hee Cheon,et al.  Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.

[62]  Richard Nock,et al.  Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption , 2017, ArXiv.

[63]  Hassan Takabi,et al.  CryptoDL: Deep Neural Networks over Encrypted Data , 2017, ArXiv.

[64]  Yao Lu,et al.  Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..

[65]  Sarvar Patel,et al.  Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..

[66]  Miguel A. Labrador,et al.  Privacy-Preserving Mechanisms for Crowdsensing: Survey and Research Challenges , 2017, IEEE Internet of Things Journal.

[67]  S. Gage,et al.  Acoustic Footprint of Snowmobile Noise and Natural Quiet Refugia in an Alaskan Wilderness , 2017, Natural Areas Journal.

[68]  W. Zielinski,et al.  Ski areas affect Pacific marten movement, habitat use, and density , 2017 .

[69]  P. Bateman,et al.  Are negative effects of tourist activities on wildlife over-reported? A review of assessment methods and empirical results , 2017 .

[70]  Farinaz Koushanfar,et al.  DeepSecure: Scalable Provably-Secure Deep Learning , 2017, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).

[71]  Payman Mohassel,et al.  SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[72]  Efraim Rotem,et al.  Inside 6th-Generation Intel Core: New Microarchitecture Code-Named Skylake , 2017, IEEE Micro.

[73]  Giuseppe Ateniese,et al.  Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.

[74]  Courtney L. Larson,et al.  Effects of Recreation on Animals Revealed as Widespread through a Global Systematic Review , 2016, PloS one.

[75]  Nicolas Gama,et al.  Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.

[76]  Emmett Witchel,et al.  Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data , 2016, OSDI.

[77]  Vitaly Shmatikov,et al.  Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[78]  Martín Abadi,et al.  Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data , 2016, ICLR.

[79]  Ran El-Yaniv,et al.  Quantized Neural Networks: Training Neural Networks with Low Precision Weights and Activations , 2016, J. Mach. Learn. Res..

[80]  A. Juels,et al.  Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.

[81]  Sebastian Nowozin,et al.  Oblivious Multi-Party Machine Learning on Trusted Processors , 2016, USENIX Security Symposium.

[82]  Kelly J. Sivy,et al.  Variable effects of snow conditions across boreal mesocarnivore species , 2016 .

[83]  Michael Naehrig,et al.  CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.

[84]  Carlos V. Rozas,et al.  Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave , 2016, HASP 2016.

[85]  S. Gage,et al.  Temporal and spatial variation of a winter soundscape in south-central Alaska , 2016, Landscape Ecology.

[86]  Ciarán Mc Goldrick,et al.  Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs , 2016, AFRICACRYPT.

[87]  S. Côté,et al.  Space use analyses suggest avoidance of a ski area by mountain goats , 2016 .

[88]  Blaise Agüera y Arcas,et al.  Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.

[89]  Somesh Jha,et al.  Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.

[90]  Vitaly Shmatikov,et al.  Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[91]  Xintao Wu,et al.  Regression Model Fitting under Differential Privacy and Model Inversion Attack , 2015, IJCAI.

[92]  R. Palme,et al.  Disturbance of wildlife by outdoor winter recreation: allostatic stress response and altered activity-energy budgets. , 2015, Ecological applications : a publication of the Ecological Society of America.

[93]  Léo Ducas,et al.  FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second , 2015, EUROCRYPT.

[94]  Mikhail Belkin,et al.  Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[95]  M. McDaniel,et al.  Polycyclic Aromatic Hydrocarbons in the Snowpack and Surface Water in Blackwood Canyon, Lake Tahoe, CA, as Related to Snowmobile Activity , 2015 .

[96]  T. Mullet Effects of snowmobile noise and activity on a boreal ecosystem in southcentral Alaska , 2014 .

[97]  V. Bleich,et al.  Demographic responses of bighorn sheep to recreational activities: A trial of a trail , 2014 .

[98]  Katie M. Moriarty Habitat use and movement behavior of Pacific marten (Martes caurina) in response to forest management practices in Lassen National Forest, California , 2014 .

[99]  Alexander J. Smola,et al.  Scaling Distributed Machine Learning with the Parameter Server , 2014, OSDI.

[100]  N. Nepal A Geospatial Approach to Wildlife and Wilderness Management , 2014 .

[101]  Somesh Jha,et al.  Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.

[102]  R. Sweitzer,et al.  Using DNA to describe and quantify interspecific killing of fishers in California , 2014 .

[103]  R. Nielson,et al.  Effects of winter recreation on northern ungulates with focus on moose (Alces alces) and snowmobiles , 2014, European Journal of Wildlife Research.

[104]  J. Barber,et al.  An experimental investigation into the effects of traffic noise on distributions of birds: avoiding the phantom road , 2013, Proceedings of the Royal Society B: Biological Sciences.

[105]  K. Longshore,et al.  Detecting short‐term responses to weekend recreation activity: Desert bighorn sheep avoidance of hiking trails , 2013 .

[106]  S. Côté,et al.  Do mountain goats habituate to helicopter disturbance , 2013 .

[107]  S. Buskirk,et al.  Footload influences wildlife use of compacted trails in the snow , 2013 .

[108]  Jung Hee Cheon,et al.  Batch Fully Homomorphic Encryption over the Integers , 2013, EUROCRYPT.

[109]  Marc'Aurelio Ranzato,et al.  Large Scale Distributed Deep Networks , 2012, NIPS.

[110]  Michael Naehrig,et al.  ML Confidential: Machine Learning on Encrypted Data , 2012, ICISC.

[111]  Joseph M. Northrup,et al.  Effects of Humans on Behaviour of Wildlife Exceed Those of Natural Predators in a Landscape of Fear , 2012, PloS one.

[112]  O. Schmitz,et al.  Projected range shifting by montane mammals under climate change: implications for Cascadia's National Parks , 2012 .

[113]  Catherine P. Ortega,et al.  CHAPTER 2 EffECTS Of NOiSE POLLUTiON ON biRdS: A bRiEf REViEw Of OUR kNOwLEdgE , 2012 .

[114]  Craig Gentry,et al.  (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.

[115]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[116]  Vinod Vaikuntanathan,et al.  Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.

[117]  Veronika Braunisch,et al.  Spatially explicit modeling of conflict zones between wildlife and snow sports: prioritizing areas for winter refuges. , 2011, Ecological applications : a publication of the Ecological Society of America.

[118]  Brent Waters,et al.  Functional Encryption: Definitions and Challenges , 2011, TCC.

[119]  Holger Dettki,et al.  Does off-trail backcountry skiing disturb moose? , 2010, European Journal of Wildlife Research.

[120]  Dan Boneh,et al.  Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.

[121]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[122]  Kevin R Crooks,et al.  The costs of chronic noise exposure for terrestrial organisms. , 2010, Trends in ecology & evolution.

[123]  Yen-Wei Chen,et al.  Feature Selection Using Recursive Feature Elimination for Handwritten Digit Recognition , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[124]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[125]  Leslie M. Naylor,et al.  Behavioral Responses of North American Elk to Recreational Activity , 2009 .

[126]  T. Stankowich Ungulate flight responses to human disturbance: a review and meta-analysis. , 2008 .

[127]  Craig Gentry,et al.  Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..

[128]  S. Côté,et al.  Habitat use patterns in relation to escape terrain : are alpine ungulate females trading off better foraging sites for safety? , 2007 .

[129]  L. Ruggiero,et al.  Wolverine Conservation and Management , 2007 .

[130]  B. Keller,et al.  Bighorn Sheep Response to Road-Related Disturbances in Rocky Mountain National Park, Colorado , 2007 .

[131]  J. Krebs,et al.  Multiscale Habitat Use by Wolverines in British Columbia, Canada , 2007 .

[132]  C. Carroll Interacting Effects of Climate Change, Landscape Conversion, and Harvest on Carnivore Populations at the Range Margin: Marten and Lynx in the Northern Appalachians , 2007, Conservation biology : the journal of the Society for Conservation Biology.

[133]  J. Squires,et al.  The Effect of Snowmobile Trails on Coyote Movements Within Lynx Home Ranges , 2007 .

[134]  Chris J. Johnson,et al.  Displacement of Mountain Caribou From Winter Habitat by Snowmobiles , 2007 .

[135]  Yufei Tao,et al.  M-invariance: towards privacy preserving re-publication of dynamic datasets , 2007, SIGMOD '07.

[136]  M. Schaub,et al.  Spreading free-riding snow sports represent a novel serious threat for wildlife , 2007, Proceedings of the Royal Society B: Biological Sciences.

[137]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[138]  R. Musselman,et al.  Air quality at a snowmobile staging area and snow chemistry on and off trail in a Rocky Mountain subalpine forest, Snowy Range, Wyoming , 2007, Environmental monitoring and assessment.

[139]  A. Hastings,et al.  Modeling Sound due to Over-Snow Vehicles in Yellowstone and Grand Teton National Parks , 2006 .

[140]  J. Borkowski,et al.  Behavioral responses of bison and elk in Yellowstone to snowmobiles and snow coaches. , 2006, Ecological applications : a publication of the Ecological Society of America.

[141]  J. T. Flinders,et al.  Potential Impacts of Coyotes and Snowmobiles on Lynx Conservation in the Intermountain West , 2006 .

[142]  R. May,et al.  Impact of infrastructure on habitat selection of wolverines Gulo gulo , 2006 .

[143]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[144]  D. Lindenmayer,et al.  The implications of snow-based recreation for small mammals in the subnivean space in south-east Australia. , 2006 .

[145]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[146]  Stephen P. Boyd,et al.  Robust Fisher Discriminant Analysis , 2005, NIPS.

[147]  Aaron J. Poe,et al.  Mountain goat response to helicopter overflights in Alaska , 2005 .

[148]  Brent Waters Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[149]  O. Vistad,et al.  Recreational Conflict Is Affective: The Case of Cross-Country Skiers and Snowmobiles , 2004 .

[150]  Jonathan Katz,et al.  A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.

[151]  Michael J. Wisdom,et al.  EVALUATION OF LANDSCAPE MODELS FOR WOLVERINES IN THE INTERIOR NORTHWEST, UNITED STATES OF AMERICA , 2003 .

[152]  Robert P. W. Duin,et al.  Bagging, Boosting and the Random Subspace Method for Linear Classifiers , 2002, Pattern Analysis & Applications.

[153]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[154]  R. Noss,et al.  CARNIVORES AS FOCAL SPECIES FOR CONSERVATION PLANNING IN THE ROCKY MOUNTAIN REGION , 2001 .

[155]  F. J. Singer,et al.  Responses of Desert Bighorn Sheep to Increased Human Recreation , 2001 .

[156]  E. Bull,et al.  SURVIVAL, CAUSES OF MORTALITY, AND REPRODUCTION IN THE AMERICAN MARTEN IN NORTHEASTERN OREGON , 2001 .

[157]  Jason C. Ross,et al.  Measurement and modeling of snowmobile noise and audibility at Yellowstone and Grand Teton National Parks , 2000 .

[158]  Audrey J. Magoun,et al.  Characteristics of wolverine reproductive den sites , 1998 .

[159]  J. Gaillard,et al.  Effects of density and weather on survival of bighorn sheep lambs ( Ovis canadensis ) , 1998 .

[160]  James M. Keller,et al.  The possibilistic C-means algorithm: insights and recommendations , 1996, IEEE Trans. Fuzzy Syst..

[161]  S. Boutin,et al.  Hunting behaviour of a sympatric felid and canid in relation to vegetative cover , 1995, Animal Behaviour.

[162]  A. Schwarzenberg-Czerny On matrix factorization and efficient least squares solution. , 1995 .

[163]  Donald D. Katnik,et al.  Survival in an Intensively Trapped Marten Population in Maine , 1994 .

[164]  S. Boutin,et al.  The influence of snow on lynx and coyote movements: does morphology affect behavior? , 1991, Oecologia.

[165]  T. Fuller Effect of snow depth on wolf activity and prey selection in north central Minnesota , 1991 .

[166]  K. Parker,et al.  Energy expenditures for locomotion by mule deer and elk , 1984 .

[167]  M. Hornocker,et al.  Ecology of the wolverine in northwestern Montana , 1981 .

[168]  R. H. Johnston,et al.  Factors influencing heart rate in free-ranging bighorn sheep: a physiological approach to the study of wildlife harassment , 1979 .

[169]  J. Bollinger,et al.  Snowmobile Effects on Movements of White-tailed Deer: A Case-study , 1979, Environmental Conservation.

[170]  M. J. Dorrance,et al.  EFFECTS OF SNOWMOBILES ON WHITE-TAILED DEER , 1975 .

[171]  J. J. Ozoga,et al.  Winter activities and feeding habits of northern Michigan coyotes. , 1966 .

[172]  Jing He,et al.  Privacy preserving classification on local differential privacy in data centers , 2020, J. Parallel Distributed Comput..

[173]  Harry Chandra Tanuwidjaja,et al.  Privacy-Preserving Deep Learning on Machine Learning as a Service—a Comprehensive Survey , 2020, IEEE Access.

[174]  Dong Seong Kim,et al.  Privacy-Preserving Reinforcement Learning Using Homomorphic Encryption in Cloud Computing Infrastructures , 2020, IEEE Access.

[175]  Pan Hui,et al.  Privacy-Preserving Asynchronous Federated Learning Mechanism for Edge Network Computing , 2020, IEEE Access.

[176]  Robert Laganière,et al.  Membership Inference Attack against Differentially Private Deep Learning Model , 2018, Trans. Data Priv..

[177]  U. Fish RELATIONSHIP BETWEEN SNOW DEPTH AND GRAY WOLF PREDATION ON WHITE-TAILED DEER , 2018 .

[178]  S. Boutin,et al.  Snow conditions influence grey wolf (Canis lupus) travel paths: the effect of human-created linear features , 2018 .

[179]  Chris J. Johnson,et al.  Spatiotemporal response of mountain caribou to the intensity of backcountry skiing , 2018 .

[180]  Constance Morel,et al.  Privacy-Preserving Classification on Deep Neural Network , 2017, IACR Cryptol. ePrint Arch..

[181]  Melissa Chase,et al.  Private Collaborative Neural Network Learning , 2017, IACR Cryptol. ePrint Arch..

[182]  A. Courtemanch Seasonal habitat selection and impacts of backcountry recreation on a formerly migratory bighorn sheep population in northwest Wyoming, USA , 2014 .

[183]  Frederik Vercauteren,et al.  Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[184]  W. Krohn Distribution changes of American martens and fishers in eastern North America, 1699–2001 - Chapter 4 , 2012 .

[185]  Lowell H. Suring,et al.  Brown Bear Den Habitat and Winter Recreation in South-Central Alaska , 2010 .

[186]  G. Pederson,et al.  A century of climate and ecosystem change in Western Montana: what do temperature trends portend? , 2010 .

[187]  Jennifer L. B. Dowd Coyote Diet and Movements in Relation to Winter Recreation in Northwestern Wyoming: Implications for Lynx Conservation , 2010 .

[188]  S. Mccool,et al.  Finite Recreation Opportunities: The Forest Service, the Bureau of Land Management, and Off-Road Vehicle Management , 2009 .

[189]  J. Jokimäki,et al.  Territory occupancy and breeding success of the Golden Eagle (Aquila chrysaetos) around tourist destinations in northern Finland , 2008 .

[190]  N. Freeman MOTORIZED BACKCOUNTRY RECREATION AND STRESS RESPONSE IN MOUNTAIN CARIBOU (Rangifer tarandus caribou) , 2008 .

[191]  UNDERGRADUATE PROGRAMS,et al.  COLLEGE OF AGRICULTURE AND NATURAL RESOURCES , 2005 .

[192]  H. Preisler,et al.  Effects of off-road recreation on mule deer and elk. , 2004 .

[193]  S. Cherry,et al.  Grizzly bear denning and potential conflict areas in the Greater Yellowstone Ecosystem , 2002 .

[194]  Padhraic Smyth,et al.  Model selection for probabilistic clustering using cross-validated likelihood , 2000, Stat. Comput..

[195]  K. Aubry Ecology of Canada lynx in Southern boreal forest , 2000 .

[196]  K. Simpson,et al.  IMPACTS OF BACKCOUNTRY RECREATION ACTIVITIES ON MOUNTAIN CARIBOU , 2000 .

[197]  Nancy Warren,et al.  CANADA LYNX CONSERVATION ASSESSMENT AND STRATEGY , 2000 .

[198]  Grant Hokit,et al.  EFFECTS OF RECREATION ON ROCKY MOUNTAIN WILDLIFE A Review for Montana www.montanatws.org MONTANA CHAPTER OF THE WILDLIFE SOCIETY Written by Bryce Maxell - Wildlife Biology Program, University of Montana, Missoula , 1999 .

[199]  Sandra K. Martin,et al.  Forest carnivore conservation and management in the interior Columbia basin: issues and environmental correlates. , 1998 .

[200]  Michigan.,et al.  Toxicological profile for dichloropropenes , 2008 .

[201]  R. Boone,et al.  Relations among fishers, snow, and martens in California: results from small-scale spatial comparisons , 1997 .

[202]  S. Côté Mountain goat responses to helicopter disturbance , 1996 .

[203]  J. Berger,et al.  Winter recreation and hibernating black bears Ursus americanus , 1994 .

[204]  L. Jack Lyon,et al.  The Scientific basis for conserving forest carnivores : American marten, fisher, lynx, and wolverine in the western United States / , 1994 .

[205]  E. F. Cassirer,et al.  ELK RESPONSES TO DISTURBANCE BY CROSS-COUNTRY SKIERS IN YELLOWSTONE NATIONAL PARK , 1992 .

[206]  G. Koehler,et al.  Managing spruce-fir habitat for lynx and snowshoe hare. , 1990 .

[207]  James A. Baker,et al.  Wild furbearer management and conservation in North America , 1987 .

[208]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[209]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[210]  Keith E. Aune Impacts of winter recreationists on wildlife in a portion of Yellowstone National Park, Wyoming , 1981 .

[211]  Montana.,et al.  Mountain goat habitat management plan for the Cabinet Mountains, Montana / , 1980 .

[212]  Donald Gustafson,et al.  Fuzzy clustering with a fuzzy covariance matrix , 1978, 1978 IEEE Conference on Decision and Control including the 17th Symposium on Adaptive Processes.

[213]  L. Mech,et al.  The Wolf: The Ecology and Behavior of an Endangered Species , 1970 .