暂无分享,去创建一个
Pei-Yuan Wu | Hung Nguyen | Di Zhuang | J. Morris Chang | Pei-Yuan Wu | Hung Nguyen | J. M. Chang | Di Zhuang
[1] Pierre Baldi,et al. Autoencoders, Unsupervised Learning, and Deep Architectures , 2011, ICML Unsupervised and Transfer Learning.
[2] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[3] Ian Goodfellow,et al. Generative adversarial networks , 2020, Commun. ACM.
[4] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[5] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[6] Shiming He,et al. An efficient privacy-preserving compressive data gathering scheme in WSNs , 2015, Inf. Sci..
[7] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[8] Yucel Saygin,et al. Secret charing vs. encryption-based techniques for privacy preserving data mining , 2007 .
[9] Raja Giryes,et al. Autoencoders , 2020, ArXiv.
[10] Tianqing Zhu,et al. Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture , 2018, IEEE Access.
[11] Ram Rajagopal,et al. Understanding Compressive Adversarial Privacy , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[12] S. Y. Kung,et al. A Compressive Privacy approach to Generalized Information Bottleneck and Privacy Funnel problems , 2017, J. Frankl. Inst..
[13] David J. Kriegman,et al. From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[14] Y. Saygin,et al. Secret Sharing vs . Encryption-based Techniques For Privacy Preserving Data Mining 1 , 2008 .
[15] Zhenyu Wu,et al. Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study , 2018, ECCV.
[16] Tsuyoshi Murata,et al. {m , 1934, ACML.
[17] Dejing Dou,et al. Differential Privacy Preservation for Deep Auto-Encoders: an Application of Human Behavior Prediction , 2016, AAAI.
[18] Divyakant Agrawal,et al. Privacy preserving decision tree learning over multiple parties , 2007, Data Knowl. Eng..
[19] Hassan Takabi,et al. CryptoDL: Deep Neural Networks over Encrypted Data , 2017, ArXiv.
[20] S.Y. Kung,et al. Compressive Privacy: From Information\/Estimation Theory to Machine Learning [Lecture Notes] , 2017, IEEE Signal Processing Magazine.
[21] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.
[22] Larry A. Wasserman,et al. Differential privacy with compression , 2009, 2009 IEEE International Symposium on Information Theory.
[23] Sun-Yuan Kung,et al. Privacy-preserving PCA on horizontally-partitioned data , 2017, 2017 IEEE Conference on Dependable and Secure Computing.
[24] Andy Harter,et al. Parameterisation of a stochastic model for human face identification , 1994, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision.
[25] Kamalika Chaudhuri,et al. Privacy-preserving logistic regression , 2008, NIPS.
[26] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[27] Sen Wang,et al. FRiPAL: Face recognition in privacy abstraction layer , 2017, 2017 IEEE Conference on Dependable and Secure Computing.
[28] Adi Shamir,et al. How to share a secret , 1979, CACM.
[29] Yuval Tassa,et al. Continuous control with deep reinforcement learning , 2015, ICLR.
[30] Johannes Blömer. How to Share a Secret , 2011, Algorithms Unplugged.
[31] Xiaoqian Jiang,et al. Differential-Private Data Publishing Through Component Analysis , 2013, Trans. Data Priv..
[32] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[33] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[34] Yin Yang,et al. Functional Mechanism: Regression Analysis under Differential Privacy , 2012, Proc. VLDB Endow..
[35] J. F. A. de O. Pantoja. Algorithms for constrained optimization , 1984 .