暂无分享,去创建一个
Martín Abadi | Úlfar Erlingsson | Kunal Talwar | Nicolas Papernot | Ian J. Goodfellow | Nicolas Papernot | Martín Abadi | Kunal Talwar | Ú. Erlingsson | I. Goodfellow
[1] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, Allerton.
[2] Eric B. Baum,et al. Neural net algorithms that learn in polynomial time from examples and queries , 1991, IEEE Trans. Neural Networks.
[3] Gregory R. Koch,et al. Siamese Neural Networks for One-Shot Image Recognition , 2015 .
[4] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[5] Rich Caruana,et al. Model compression , 2006, KDD '06.
[6] Yann LeCun,et al. Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..
[7] Kamalika Chaudhuri,et al. Privacy-preserving logistic regression , 2008, NIPS.
[8] Thomas Steinke,et al. Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds , 2016, TCC.
[9] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[10] Dana Angluin,et al. Queries and concept learning , 1988, Machine Learning.
[11] Wojciech Zaremba,et al. Improved Techniques for Training GANs , 2016, NIPS.
[12] Thomas G. Dietterich. Multiple Classifier Systems , 2000, Lecture Notes in Computer Science.
[13] Bhiksha Raj,et al. Multiparty Differential Privacy via Aggregation of Locally Trained Classifiers , 2010, NIPS.
[14] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[15] Omer Levy,et al. Published as a conference paper at ICLR 2018 S IMULATING A CTION D YNAMICS WITH N EURAL P ROCESS N ETWORKS , 2018 .
[16] B. Frey,et al. Predicting the sequence specificities of DNA- and RNA-binding proteins by deep learning , 2015, Nature Biotechnology.
[17] Bhiksha Raj,et al. Privacy preserving probabilistic inference with Hidden Markov Models , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[18] Ilya Mironov,et al. Rényi Differential Privacy , 2017, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).
[19] Guy N. Rothblum,et al. Boosting and Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[20] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[21] Peter Young,et al. Smart Reply: Automated Response Suggestion for Email , 2016, KDD.
[22] Raef Bassily,et al. Differentially Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds , 2014, 1405.7085.
[23] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[24] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[25] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[26] Xinyun Chen. Under Review as a Conference Paper at Iclr 2017 Delving into Transferable Adversarial Ex- Amples and Black-box Attacks , 2016 .
[27] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[28] Jason Poulos,et al. Missing Data Imputation for Supervised Learning , 2016, Appl. Artif. Intell..
[29] Martin J. Wainwright,et al. Privacy Aware Learning , 2012, JACM.
[30] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[31] Anand D. Sarwate,et al. Stochastic gradient descent with differentially private updates , 2013, 2013 IEEE Global Conference on Signal and Information Processing.
[32] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[33] Igor Kononenko,et al. Machine learning for medical diagnosis: history, state of the art and perspective , 2001, Artif. Intell. Medicine.
[34] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[35] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[36] L Sweeney,et al. Weaving Technology and Policy Together to Maintain Confidentiality , 1997, Journal of Law, Medicine & Ethics.
[37] Guy N. Rothblum,et al. Concentrated Differential Privacy , 2016, ArXiv.
[38] Mikhail Belkin,et al. Learning privately from multiparty data , 2016, ICML.
[39] Claire Monteleoni,et al. A Semi-Supervised Learning Approach to Differential Privacy , 2013, 2013 IEEE 13th International Conference on Data Mining Workshops.
[40] Charu C. Aggarwal,et al. On k-Anonymity and the Curse of Dimensionality , 2005, VLDB.
[41] Geoffrey E. Hinton,et al. Distilling the Knowledge in a Neural Network , 2015, ArXiv.