暂无分享,去创建一个
Jian Weng | Hongwei Huang | Weiqi Luo | Anjia Yang | Yue Zhang | Guoqiang Zeng | J. Weng | Hongwei Huang | Weiqi Luo | Guoqiang Zeng | Anjia Yang | Yue Zhang
[1] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[2] Mei Wang,et al. Deep Visual Domain Adaptation: A Survey , 2018, Neurocomputing.
[3] A. Ng. Feature selection, L1 vs. L2 regularization, and rotational invariance , 2004, Twenty-first international conference on Machine learning - ICML '04.
[4] Yair Zick,et al. On the Privacy Risks of Model Explanations , 2019 .
[5] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[6] Paul Voigt,et al. The EU General Data Protection Regulation (GDPR) , 2017 .
[7] Reza Shokri,et al. Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks , 2018, ArXiv.
[8] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[9] Yang Zhang,et al. Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning , 2019, USENIX Security Symposium.
[10] David Evans,et al. Evaluating Differentially Private Machine Learning in Practice , 2019, USENIX Security Symposium.
[11] Amir Houmansadr,et al. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[12] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[13] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[14] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[15] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[16] Martín Abadi,et al. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data , 2016, ICLR.
[17] Christoph Zauner,et al. Implementation and Benchmarking of Perceptual Image Hash Functions , 2010 .
[18] Mario Fritz,et al. GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models , 2019, CCS.
[19] Ju Ren,et al. GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy , 2019, IEEE Transactions on Information Forensics and Security.
[20] Thomas G. Dietterich,et al. Benchmarking Neural Network Robustness to Common Corruptions and Perturbations , 2018, ICLR.
[21] Michael Backes,et al. MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples , 2019, CCS.
[22] Nikita Borisov,et al. Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations , 2018, CCS.
[23] Prateek Mittal,et al. Privacy Risks of Securing Machine Learning Models against Adversarial Examples , 2019, CCS.
[24] Mario Fritz,et al. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models , 2018, NDSS.
[25] François Laviolette,et al. Domain-Adversarial Training of Neural Networks , 2015, J. Mach. Learn. Res..
[26] Somesh Jha,et al. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting , 2017, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[27] Zhenkai Liang,et al. Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment , 2019, CCS.
[28] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[29] Reza Shokri,et al. Privacy Risks of Explaining Machine Learning Models , 2019, ArXiv.
[30] Pascal Vincent,et al. Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion , 2010, J. Mach. Learn. Res..
[31] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[32] Reza Shokri,et al. Machine Learning with Membership Privacy using Adversarial Regularization , 2018, CCS.
[33] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[34] Trevor Darrell,et al. Adversarial Discriminative Domain Adaptation , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[35] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[36] Trevor Darrell,et al. Deep Domain Confusion: Maximizing for Domain Invariance , 2014, CVPR 2014.
[37] Mengjie Zhang,et al. Deep Reconstruction-Classification Networks for Unsupervised Domain Adaptation , 2016, ECCV.
[38] Samuel A. Barnett,et al. Convergence Problems with Generative Adversarial Networks (GANs) , 2018, ArXiv.
[39] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[40] Kate Saenko,et al. Deep CORAL: Correlation Alignment for Deep Domain Adaptation , 2016, ECCV Workshops.
[41] Marcel Salathé,et al. Using Deep Learning for Image-Based Plant Disease Detection , 2016, Front. Plant Sci..
[42] François Laviolette,et al. Domain-Adversarial Neural Networks , 2014, ArXiv.
[43] Xiaogang Wang,et al. DeepReID: Deep Filter Pairing Neural Network for Person Re-identification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[44] Mario Fritz,et al. GAN-Leaks: A Taxonomy of Membership Inference Attacks against GANs , 2019, ArXiv.
[45] Kai Peng,et al. SocInf: Membership Inference Attacks on Social Media Health Data With Machine Learning , 2019, IEEE Transactions on Computational Social Systems.
[46] Boi Faltings,et al. Generating Artificial Data for Private Deep Learning , 2018, 1803.03148.
[47] Heiga Zen,et al. WaveNet: A Generative Model for Raw Audio , 2016, SSW.
[48] Emiliano De Cristofaro,et al. Knock Knock, Who's There? Membership Inference on Aggregate Location Data , 2017, NDSS.