暂无分享,去创建一个
[1] Zhuowen Tu,et al. Aggregated Residual Transformations for Deep Neural Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[2] Fei-Fei Li,et al. ImageNet: A large-scale hierarchical image database , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[3] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[4] David A. Shamma,et al. YFCC100M , 2015, Commun. ACM.
[5] Percy Liang,et al. Understanding Black-box Predictions via Influence Functions , 2017, ICML.
[6] Peter Norvig,et al. Deep Learning with Dynamic Computation Graphs , 2017, ICLR.
[7] James Zou,et al. Making AI Forget You: Data Deletion in Machine Learning , 2019, NeurIPS.
[8] Alexander J. Smola,et al. Fast Differentially Private Matrix Factorization , 2015, RecSys.
[9] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[10] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[11] Ichiro Takeuchi,et al. Multiple Incremental Decremental Learning of Support Vector Machines , 2009, IEEE Transactions on Neural Networks.
[12] Christopher D. Manning,et al. Improved Semantic Representations From Tree-Structured Long Short-Term Memory Networks , 2015, ACL.
[13] Kaiming He,et al. Mask R-CNN , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[14] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Omer Levy,et al. RoBERTa: A Robustly Optimized BERT Pretraining Approach , 2019, ArXiv.
[16] Yiming Yang,et al. Transformer-XL: Attentive Language Models beyond a Fixed-Length Context , 2019, ACL.
[17] Junfeng Yang,et al. Towards Making Systems Forget with Machine Unlearning , 2015, 2015 IEEE Symposium on Security and Privacy.
[18] Xiaogang Wang,et al. Pyramid Scene Parsing Network , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[19] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[20] Cheng-Hao Tsai,et al. Incremental and decremental training for linear classification , 2014, KDD.
[21] Andrew Zisserman,et al. Quo Vadis, Action Recognition? A New Model and the Kinetics Dataset , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[22] Úlfar Erlingsson,et al. The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets , 2018, ArXiv.
[23] Anand D. Sarwate,et al. Near-optimal Differentially Private Principal Components , 2012, NIPS.
[24] S. Weisberg,et al. Residuals and Influence in Regression , 1982 .
[25] Kevin Gimpel,et al. Towards Universal Paraphrastic Sentence Embeddings , 2015, ICLR.
[26] Stanley C. Eisenstat,et al. Downdating the Singular Value Decomposition , 1995, SIAM J. Matrix Anal. Appl..
[27] Li Zilles,et al. Machine, Unlearning , 2018 .
[28] Omer Levy,et al. GLUE: A Multi-Task Benchmark and Analysis Platform for Natural Language Understanding , 2018, BlackboxNLP@EMNLP.
[29] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[30] Gert Cauwenberghs,et al. Incremental and Decremental Support Vector Machine Learning , 2000, NIPS.
[31] Yiming Yang,et al. XLNet: Generalized Autoregressive Pretraining for Language Understanding , 2019, NeurIPS.
[32] Kaiming He,et al. Exploring the Limits of Weakly Supervised Pretraining , 2018, ECCV.
[33] Somesh Jha,et al. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting , 2017, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[34] Jorge Nocedal,et al. On the limited memory BFGS method for large scale optimization , 1989, Math. Program..