Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
暂无分享,去创建一个
Somesh Jha | Thomas Ristenpart | Matt Fredrikson | S. Jha | Matt Fredrikson | T. Ristenpart | Thomas Ristenpart
[1] L. Sweeney. Simple Demographics Often Identify People Uniquely , 2000 .
[2] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[3] Christopher Meek,et al. Adversarial learning , 2005, KDD '05.
[4] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[5] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[6] Cynthia Dwork,et al. The price of privacy and the limits of LP decoding , 2007, STOC '07.
[7] W.L. Woo,et al. Secure Authentication for Face Recognition , 2007, 2007 IEEE Symposium on Computational Intelligence in Image and Signal Processing.
[8] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[9] S. Nelson,et al. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.
[10] Honglak Lee,et al. Convolutional deep belief networks for scalable unsupervised learning of hierarchical representations , 2009, ICML '09.
[11] Haixu Tang,et al. Learning your identity and disease from research papers: information leaks in genome wide association study , 2009, CCS.
[12] Michael I. Jordan,et al. Genomic privacy and limits of individual detection in a pool , 2009, Nature Genetics.
[13] R. Altman,et al. Estimation of the warfarin dose with clinical and pharmacogenetic data. , 2009, The New England journal of medicine.
[14] Adam D. Smith,et al. The price of privately releasing contingency tables and the spectra of random matrices with correlated rows , 2010, STOC '10.
[15] Joshua C. Denny,et al. The disclosure of diagnosis codes can breach research participants' privacy , 2010, J. Am. Medical Informatics Assoc..
[16] Graham Cormode,et al. Personal privacy vs population privacy: learning to attack anonymization , 2011, KDD.
[17] Honglak Lee,et al. Learning hierarchical representations for face verification with convolutional deep belief networks , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[18] Chih-Lin Chi,et al. Individualized Patient-centered Lifestyle Recommendations: an Expert System for Communicating Patient Specific Cardiovascular Risk Information and Prioritizing Lifestyle Options , 2022 .
[19] Anil K. Jain,et al. Open source biometric recognition , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[20] Ninghui Li,et al. Membership privacy: a unifying framework for privacy definitions , 2013, CCS.
[21] Ian J. Goodfellow,et al. Pylearn2: a machine learning research library , 2013, ArXiv.
[22] Adam D. Smith,et al. The Power of Linear Reconstruction Attacks , 2012, SODA.
[23] Somesh Jha,et al. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.
[24] Ming Yang,et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[25] Denis Nekipelov,et al. Estimation of Treatment Effects from Combined Data: Identification versus Data Security , 2015 .
[26] Sumit Mund,et al. Microsoft Azure Machine Learning , 2015 .