Author:
Luo Sida,Yu Fangchao,Wang Lina,Zeng Bo,Pang Zhi,Zhao Kai
Publisher
Springer Nature Switzerland
Reference30 articles.
1. Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308–318 (2016)
2. Aïvodji, U., Gambs, S., Ther, T.: Gamin: an adversarial approach to black-box model inversion. arXiv preprint arXiv:1909.11835 (2019)
3. Ayad, A., Renner, M., Schmeink, A.: Improving the communication and computation efficiency of split learning for iot applications. In: 2021 IEEE Global Communications Conference (GLOBECOM), pp. 01–06. IEEE (2021)
4. Bonawitz, K., et al.: Towards federated learning at scale: system design. Proc. Mach. Learn. Syst. 1, 374–388 (2019)
5. Chen, S., Kahla, M., Jia, R., Qi, G.J.: Knowledge-enriched distributional model inversion attacks. In: Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 16178–16187 (2021)