Publisher
Springer Science and Business Media LLC
Reference43 articles.
1. Machanavajjhala A, Kifer D, Gehrke J, Ven-kitasubramaniam M (2007) l-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data (TKDD) 1(1):1–24
2. Li N, Li T, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In: 23rd International conference on data engineering, pp 106–115
3. Goodfellow I, Pougget-Abadie J, Mirza M, Xu B, Warde-Farely D, Ozair S, Courvalle A, Bongio Y (2014) Generative adversarial nets. In: 27th International conference on neural information processing systems, pp 2672–2680
4. Hayes J, Melis L, Denerzis G, De Cristofaro E (2019) LOGAN: membership inference attacks against generative models. In: Privacy enhancing technologies symposium, pp 133–152
5. Hilprecht B, Harterich M, Bernau D (2019) Monte Carlo and reconstruction membership inference attacks against genera-tive models. In: Privacy enhancing technologies symposium, pp 232–249
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献