暂无分享,去创建一个
Hamed Haddadi | Anastasia Borovykh | Soteris Demetriou | Mohammad Malekzadeh | Fan Mo | H. Haddadi | M. Malekzadeh | A. Borovykh | Soteris Demetriou | Fan Mo
[1] Andrea Vedaldi,et al. Understanding deep image representations by inverting them , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[2] Moustapha Cissé,et al. Parseval Networks: Improving Robustness to Adversarial Examples , 2017, ICML.
[3] W. Cleveland,et al. Locally Weighted Regression: An Approach to Regression Analysis by Local Fitting , 1988 .
[4] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[5] Pavlo Molchanov,et al. See through Gradients: Image Batch Recovery via GradInversion , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[6] Lek-Heng Lim,et al. Schubert Varieties and Distances between Subspaces of Different Dimensions , 2014, SIAM J. Matrix Anal. Appl..
[7] Vitaly Shmatikov,et al. Exploiting Unintended Feature Leakage in Collaborative Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[8] Guillermo Sapiro,et al. Robust Large Margin Deep Neural Networks , 2016, IEEE Transactions on Signal Processing.
[9] Shree K. Nayar,et al. Attribute and simile classifiers for face verification , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[10] Úlfar Erlingsson,et al. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks , 2018, USENIX Security Symposium.
[11] Yang Zhang,et al. Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning , 2019, USENIX Security Symposium.
[12] Richard Nock,et al. Advances and Open Problems in Federated Learning , 2021, Found. Trends Mach. Learn..
[13] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[14] David Evans,et al. Evaluating Differentially Private Machine Learning in Practice , 2019, USENIX Security Symposium.
[15] Hod Lipson,et al. Understanding Neural Networks Through Deep Visualization , 2015, ArXiv.
[16] Diego Perino,et al. PPFL: privacy-preserving federated learning with trusted execution environments , 2021, MobiSys.
[17] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[18] Naftali Tishby,et al. Opening the Black Box of Deep Neural Networks via Information , 2017, ArXiv.
[19] Brian Kingsbury,et al. Estimating Information Flow in Deep Neural Networks , 2018, ICML.
[20] Stefano Ermon,et al. A Theory of Usable Information Under Computational Constraints , 2020, ICLR.
[21] Cordelia Schmid,et al. White-box vs Black-box: Bayes Optimal Strategies for Membership Inference , 2019, ICML.
[22] Amir Houmansadr,et al. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[23] Tianjian Chen,et al. Federated Machine Learning: Concept and Applications , 2019 .
[24] Matt Fredrikson,et al. Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference , 2019, USENIX Security Symposium.
[25] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[26] Xianghua Xie,et al. GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning , 2021, ArXiv.
[27] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[28] Gene H. Golub,et al. Numerical methods for computing angles between linear subspaces , 1971, Milestones in Matrix Computation.
[29] Walter Daelemans,et al. CLiPS Stylometry Investigation (CSI) corpus: A Dutch corpus for the detection of age, gender, personality, sentiment and deception in text , 2014, LREC.
[30] Alex Sherstinsky,et al. Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) Network , 2018, Physica D: Nonlinear Phenomena.
[31] Aidmar Wainakh,et al. User Label Leakage from Gradients in Federated Learning , 2021, ArXiv.
[32] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[33] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.
[34] Yoon Kim,et al. Convolutional Neural Networks for Sentence Classification , 2014, EMNLP.
[35] Marwan Mattar,et al. Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .
[36] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[37] Somesh Jha,et al. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting , 2017, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[38] Lei Huang,et al. Layer-Wise Conditioning Analysis in Exploring the Learning Dynamics of DNNs , 2020, ECCV.
[39] Andrew Gordon Wilson,et al. Bayesian Deep Learning and a Probabilistic Perspective of Generalization , 2020, NeurIPS.
[40] Zlatko Drmac,et al. On Principal Angles between Subspaces of Euclidean Space , 2000, SIAM J. Matrix Anal. Appl..
[41] Jascha Sohl-Dickstein,et al. Sensitivity and Generalization in Neural Networks: an Empirical Study , 2018, ICLR.
[42] Luyu Wang,et al. On the Sensitivity of Adversarial Robustness to Input Data Distributions , 2018, ICLR.
[43] David Cox,et al. Scaling up biologically-inspired computer vision: A case study in unconstrained face recognition on facebook , 2011, CVPR 2011 WORKSHOPS.
[44] Philip S. Yu,et al. A Comprehensive Survey on Graph Neural Networks , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[45] Klaus-Robert Müller,et al. Layer-wise analysis of deep networks with Gaussian kernels , 2010, NIPS.
[46] Shie Mannor,et al. Ensemble Robustness and Generalization of Stochastic Deep Learning Algorithms , 2016, ICLR.
[47] Song Han,et al. Deep Leakage from Gradients , 2019, NeurIPS.
[48] Bo Zhao,et al. iDLG: Improved Deep Leakage from Gradients , 2020, ArXiv.
[49] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[50] Michael Moeller,et al. Inverting Gradients - How easy is it to break privacy in federated learning? , 2020, NeurIPS.
[51] David D. Cox,et al. On the information bottleneck theory of deep learning , 2018, ICLR.
[52] Rob Fergus,et al. Visualizing and Understanding Convolutional Networks , 2013, ECCV.
[53] Christopher Potts,et al. Learning Word Vectors for Sentiment Analysis , 2011, ACL.
[54] Yann LeCun,et al. The Loss Surfaces of Multilayer Networks , 2014, AISTATS.
[55] Yoshua Bengio,et al. Mutual Information Neural Estimation , 2018, ICML.
[56] Nikita Borisov,et al. Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations , 2018, CCS.
[57] Stefano Soatto,et al. Where is the Information in a Deep Neural Network? , 2019, ArXiv.
[58] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[59] Suman Jana,et al. Certified Robustness to Adversarial Examples with Differential Privacy , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[60] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[61] Hamed Haddadi,et al. DarkneTZ: towards model privacy at the edge using trusted execution environments , 2020, MobiSys.
[62] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[63] Nathan Srebro,et al. Exploring Generalization in Deep Learning , 2017, NIPS.