共 57 条
[31]
Dwork C, 2009, ACM S THEORY COMPUT, P371
[32]
Dwork Cynthia, 2016, CORR
[33]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[34]
Goodfellow I., 2015, C o R R , abs/ 1510. 01799v2
[35]
GRAHAM B, 2014, CORR
[36]
Gupta A, 2010, PROC APPL MATH, V135, P1106
[37]
Ierusalimschy R, 1996, SOFTWARE PRACT EXPER, V26, P635, DOI 10.1002/(SICI)1097-024X(199606)26:6<635::AID-SPE26>3.0.CO
[38]
2-P
[39]
What is the Best Multi-Stage Architecture for Object Recognition?
[J].
2009 IEEE 12TH INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV),
2009,
:2146-2153
[40]
Kairouz P, 2015, PR MACH LEARN RES, V37, P1376