Variational Model Inversion Attacks
暂无分享,去创建一个
Richard Zemel | Ashish Khisti | Alireza Makhzani | Ke Li | Kuan-Chieh Wang | Yan Fu | R. Zemel | Alireza Makhzani | A. Khisti | Ke Li | Yanzhe Fu | Kuan-Chieh Jackson Wang
[1] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[2] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[3] Bolei Zhou,et al. InterFaceGAN: Interpreting the Disentangled Face Representation Learned by GANs , 2020, IEEE transactions on pattern analysis and machine intelligence.
[4] David M. Blei,et al. Variational Inference: A Review for Statisticians , 2016, ArXiv.
[5] Tianjian Chen,et al. Federated Machine Learning: Concept and Applications , 2019 .
[6] Georg Langs,et al. Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.
[7] Richard S. Zemel,et al. Prototypical Networks for Few-shot Learning , 2017, NIPS.
[8] R. Altman,et al. Estimation of the warfarin dose with clinical and pharmacogenetic data. , 2009, The New England journal of medicine.
[9] Derek Hoiem,et al. Dreaming to Distill: Data-Free Knowledge Transfer via DeepInversion , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[10] Fahad Shahbaz Khan,et al. MineGAN: Effective Knowledge Transfer From GANs to Target Domains With Few Images , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[11] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[12] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[13] Graham W. Taylor,et al. Improved Regularization of Convolutional Neural Networks with Cutout , 2017, ArXiv.
[14] Theodoros Damoulas,et al. Generalized Variational Inference: Three arguments for deriving new Posteriors , 2019 .
[15] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[16] Michael I. Jordan,et al. On the Theory of Transfer Learning: The Importance of Task Diversity , 2020, NeurIPS.
[17] C. Holmes,et al. Assigning a value to a power likelihood in a general Bayesian model , 2017, 1701.08515.
[18] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[19] Yoshua Bengio,et al. Plug & Play Generative Networks: Conditional Iterative Generation of Images in Latent Space , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[20] Jason Yosinski,et al. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[21] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[22] Samy Bengio,et al. Density estimation using Real NVP , 2016, ICLR.
[23] Andrea Vedaldi,et al. Understanding deep image representations by inverting them , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[24] Amazon Rekognition , 2019, Machine Learning in the AWS Cloud.
[25] Zhenkai Liang,et al. Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment , 2019, ArXiv.
[26] Gregory Cohen,et al. EMNIST: Extending MNIST to handwritten letters , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[27] Peter Wood,et al. The impact of CYP2C9 and VKORC1 genetic polymorphism and patient characteristics upon warfarin dose requirements: proposal for a new dosing regimen. , 2005, Blood.
[28] Dawn Song,et al. The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[29] Sepp Hochreiter,et al. GANs Trained by a Two Time-Scale Update Rule Converge to a Local Nash Equilibrium , 2017, NIPS.
[30] Kilian Q. Weinberger,et al. On Calibration of Modern Neural Networks , 2017, ICML.
[31] Maria Rigaki,et al. A Survey of Privacy Attacks in Machine Learning , 2020, ArXiv.
[32] Minh N. Do,et al. Semantic Image Inpainting with Deep Generative Models , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[33] Yu-Chiang Frank Wang,et al. A Closer Look at Few-shot Classification , 2019, ICLR.
[34] David B. Dunson,et al. Robust Bayesian Inference via Coarsening , 2015, Journal of the American Statistical Association.
[35] R. Jia,et al. IMPROVED TECHNIQUES FOR MODEL INVERSION ATTACK , 2020, 2010.04092.
[36] Seong Joon Oh,et al. Reliable Fidelity and Diversity Metrics for Generative Models , 2020, ICML.
[37] Ronald M. Summers,et al. ChestX-ray: Hospital-Scale Chest X-ray Database and Benchmarks on Weakly Supervised Classification and Localization of Common Thorax Diseases , 2019, Deep Learning and Convolutional Neural Networks for Medical Imaging and Clinical Informatics.
[38] Andrew Zisserman,et al. Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps , 2013, ICLR.
[39] Michael I. Jordan,et al. An Introduction to Variational Methods for Graphical Models , 1999, Machine Learning.
[40] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.
[41] Rickmer Braren,et al. Secure, privacy-preserving and federated machine learning in medical imaging , 2020, Nature Machine Intelligence.
[42] Jaakko Lehtinen,et al. Analyzing and Improving the Image Quality of StyleGAN , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[43] Sham M. Kakade,et al. Few-Shot Learning via Learning the Representation, Provably , 2020, ICLR.
[44] Michael Moeller,et al. Inverting Gradients - How easy is it to break privacy in federated learning? , 2020, NeurIPS.
[45] Goichiro Hanaoka,et al. Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[46] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[47] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[48] Hubert Eichner,et al. Towards Federated Learning at Scale: System Design , 2019, SysML.
[49] Timo Aila,et al. A Style-Based Generator Architecture for Generative Adversarial Networks , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[50] Peter Wonka,et al. Image2StyleGAN: How to Embed Images Into the StyleGAN Latent Space? , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[51] Amir Houmansadr,et al. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[52] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[53] Yoshua Bengio,et al. NICE: Non-linear Independent Components Estimation , 2014, ICLR.
[54] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[55] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[56] Prafulla Dhariwal,et al. Glow: Generative Flow with Invertible 1x1 Convolutions , 2018, NeurIPS.
[57] Sébastien Marcel,et al. Biometric Antispoofing Methods: A Survey in Face Recognition , 2014, IEEE Access.
[58] Oleg V. Komogortsev,et al. Complex eye movement pattern biometrics: Analyzing fixations and saccades , 2013, 2013 International Conference on Biometrics (ICB).
[59] Somesh Jha,et al. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.
[60] Stefanos Zafeiriou,et al. ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[61] Pier Giovanni Bissiri,et al. A general framework for updating belief distributions , 2013, Journal of the Royal Statistical Society. Series B, Statistical methodology.
[62] Jaakko Lehtinen,et al. Improved Precision and Recall Metric for Assessing Generative Models , 2019, NeurIPS.
[63] N. Babaguchi,et al. Deep Face Recognizer Privacy Attack: Model Inversion Initialization by a Deep Generative Adversarial Data Space Discriminator , 2020, 2020 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).