Differentially-Private Next-Location Prediction with Neural Networks
暂无分享,去创建一个
[1] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[2] Claudio Bettini,et al. Differentially-private release of check-in data for venue recommendation , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[3] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[4] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[5] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[6] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[7] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[8] Anand D. Sarwate,et al. Stochastic gradient descent with differentially private updates , 2013, 2013 IEEE Global Conference on Signal and Information Processing.
[9] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[10] Magnus Sahlgren,et al. The Distributional Hypothesis , 2008 .
[11] Emiliano De Cristofaro,et al. LOGAN: Membership Inference Attacks Against Generative Models , 2017, Proc. Priv. Enhancing Technol..
[12] H. Brendan McMahan,et al. A General Approach to Adding Differential Privacy to Iterative Training Procedures , 2018, ArXiv.
[13] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.
[14] Xin Rong,et al. word2vec Parameter Learning Explained , 2014, ArXiv.
[15] Léon Bottou,et al. Large-Scale Machine Learning with Stochastic Gradient Descent , 2010, COMPSTAT.
[16] Aapo Hyvärinen,et al. Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics , 2012, J. Mach. Learn. Res..
[17] Xing Xie,et al. GeoMF: joint geographical modeling and matrix factorization for point-of-interest recommendation , 2014, KDD.
[18] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[19] Tassilo Klein,et al. Differentially Private Federated Learning: A Client Level Perspective , 2017, ArXiv.
[20] Gilles Barthe,et al. Privacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences , 2018, NeurIPS.
[21] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[22] Yu-Xiang Wang,et al. Subsampled Rényi Differential Privacy and Analytical Moments Accountant , 2018, AISTATS.
[23] Xiangnan He,et al. NAIS: Neural Attentive Item Similarity Model for Recommendation , 2018, IEEE Transactions on Knowledge and Data Engineering.
[24] Raef Bassily,et al. Differentially Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds , 2014, 1405.7085.
[25] Michael R. Lyu,et al. Geo-Teaser: Geo-Temporal Sequential Embedding Rank for Point-of-interest Recommendation , 2016, WWW.
[26] Toniann Pitassi,et al. Generalization in Adaptive Data Analysis and Holdout Reuse , 2015, NIPS.
[27] Vitaly Shmatikov,et al. Exploiting Unintended Feature Leakage in Collaborative Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[28] Jure Leskovec,et al. Friendship and mobility: user movement in location-based social networks , 2011, KDD.
[29] Guy N. Rothblum,et al. Concentrated Differential Privacy , 2016, ArXiv.
[30] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[31] Luming Zhang,et al. GMove: Group-Level Mobility Modeling Using Geo-Tagged Social Media , 2016, KDD.
[32] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[33] Li Zhang,et al. Learning Differentially Private Language Models Without Losing Accuracy , 2017, ArXiv.
[34] Yongfeng Zhang,et al. Relational Collaborative Filtering: Modeling Multiple Item Relations for Recommendation , 2019, SIGIR.
[35] Úlfar Erlingsson,et al. The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets , 2018, ArXiv.
[36] Lars Schmidt-Thieme,et al. Factorizing personalized Markov chains for next-basket recommendation , 2010, WWW '10.
[37] Tieniu Tan,et al. Predicting the Next Location: A Recurrent Model with Spatial and Temporal Contexts , 2016, AAAI.
[38] Lukás Burget,et al. Recurrent neural network based language model , 2010, INTERSPEECH.
[39] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[40] Philippe Cudré-Mauroux,et al. Revisiting User Mobility and Social Relationships in LBSNs: A Hypergraph Embedding Approach , 2019, WWW.
[41] Bo An,et al. POI2Vec: Geographical Latent Representation for Predicting Future Visitors , 2017, AAAI.
[42] Xiaokui Xiao,et al. Privacy Enhanced Matrix Factorization for Recommendation with Local Differential Privacy , 2018, IEEE Transactions on Knowledge and Data Engineering.
[43] Liam McNamara,et al. SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones , 2011, 2011 31st International Conference on Distributed Computing Systems.
[44] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[45] Benjamin J. Wilson,et al. Controlled Experiments for Word Embeddings , 2015, ArXiv.
[46] Thomas Steinke,et al. Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds , 2016, TCC.
[47] Marco Gruteser,et al. USENIX Association , 1992 .
[48] Jiawei Han,et al. Bridging Collaborative Filtering and Semi-Supervised Learning: A Neural Approach for POI Recommendation , 2017, KDD.
[49] Omer Levy,et al. Improving Distributional Similarity with Lessons Learned from Word Embeddings , 2015, TACL.
[50] Daqing Zhang,et al. NationTelescope: Monitoring and visualizing large-scale collective behavior in LBSNs , 2015, J. Netw. Comput. Appl..
[51] Donghyeon Park,et al. Content-Aware Hierarchical Point-of-Interest Embedding Model for Successive POI Recommendation , 2018, IJCAI.
[52] Ilya Mironov,et al. Rényi Differential Privacy , 2017, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).
[53] Raef Bassily,et al. Algorithmic stability for adaptive data analysis , 2015, STOC.
[54] T. Basaruddin,et al. Differentially private optimization algorithms for deep neural networks , 2017, 2017 International Conference on Advanced Computer Science and Information Systems (ICACSIS).
[55] Jeffrey F. Naughton,et al. A Methodology for Formalizing Model-Inversion Attacks , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).
[56] Alexander J. Smola,et al. Fast Differentially Private Matrix Factorization , 2015, RecSys.
[57] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[58] Daniel Kifer,et al. Concentrated Differentially Private Gradient Descent with Adaptive per-Iteration Privacy Budget , 2018, KDD.
[59] Chi-Yin Chow,et al. Differentially Private Location Recommendations in Geosocial Networks , 2014, 2014 IEEE 15th International Conference on Mobile Data Management.
[60] Jeffrey Dean,et al. Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.
[61] César A. Hidalgo,et al. Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.
[62] Jason Weston,et al. Natural Language Processing (Almost) from Scratch , 2011, J. Mach. Learn. Res..
[63] Xin Liu,et al. Exploring the Context of Locations for Personalized Location Recommendations , 2016, IJCAI.