咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 2 篇 网络空间安全
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 文学
    • 1 篇 外国语言文学

主题

  • 5 篇 membership infer...
  • 2 篇 machine learning
  • 1 篇 privacy-preservi...
  • 1 篇 deep learning
  • 1 篇 black-box model
  • 1 篇 neural architect...
  • 1 篇 shadow model
  • 1 篇 rényi differenti...
  • 1 篇 parameter estima...
  • 1 篇 latent dirichlet...
  • 1 篇 data privacy
  • 1 篇 data reconstruct...
  • 1 篇 domain adaptatio...
  • 1 篇 security

机构

  • 1 篇 school of comput...
  • 1 篇 key laboratory o...
  • 1 篇 department of so...
  • 1 篇 college of infor...
  • 1 篇 institute of art...
  • 1 篇 pazhou lab
  • 1 篇 school of inform...
  • 1 篇 department of co...

作者

  • 1 篇 hong chen
  • 1 篇 hongyang yan
  • 1 篇 mohammad alahmad...
  • 1 篇 abdulrahman ghar...
  • 1 篇 su-yun zhao
  • 1 篇 wu jie
  • 1 篇 zijie pan
  • 1 篇 kongyang chen
  • 1 篇 han xiaoxuan
  • 1 篇 yan li
  • 1 篇 han zhen
  • 1 篇 tao huang
  • 1 篇 jumana alsubhi
  • 1 篇 zhou wen'an
  • 1 篇 teng huang
  • 1 篇 hongwei huang
  • 1 篇 jin li
  • 1 篇 yi-xuan liu
  • 1 篇 jiewei lai
  • 1 篇 xiaoxue zhang

语言

  • 5 篇 英文
检索条件"主题词=Membership inference attack"
5 条 记 录,以下是1-10 订阅
排序:
Defense against membership inference attack Applying Domain Adaptation with Addictive Noise
收藏 引用
Journal of Computer and Communications 2021年 第5期9卷 92-108页
作者: Hongwei Huang College of Information Science and Technology Jinan University Guangzhou China
Deep learning can train models from a dataset to solve tasks. Although deep learning has attracted much interest owing to the excellent performance, security issues are gradually exposed. Deep learning may be prone to... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Black-box membership inference attacks based on shadow model
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2024年 第4期31卷 1-16页
作者: Han Zhen Zhou Wen'an Han Xiaoxuan Wu Jie School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
membership inference attacks on machine learning models have drawn significant *** current research primarily utilizes shadow modeling techniques,which require knowledge of the target model and training data,practical... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Model architecture level privacy leakage in neural networks
收藏 引用
Science China(Information Sciences) 2024年 第3期67卷 20-32页
作者: Yan LI Hongyang YAN Teng HUANG Zijie PAN Jiewei LAI Xiaoxue ZHANG Kongyang CHEN Jin LI Institute of Artificial Intelligent and Blockchain Guangzhou University Pazhou Lab
Privacy leakage is one of the most critical issues in machine learning and has attracted growing interest for tasks such as demonstrating potential threats in model attacks and creating model *** recent years, numerou... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Improving Parameter Estimation and Defensive Ability of Latent Dirichlet Allocation Model Training Under Rényi Differential Privacy
收藏 引用
Journal of Computer Science & Technology 2022年 第6期37卷 1382-1397页
作者: Tao Huang Su-Yun Zhao Hong Chen Yi-Xuan Liu Key Laboratory of Data Engineering and Knowledge Engineering(Renmin University of China) Ministry of Education Beijing 100087China School of Information Renmin University of ChinaBeijing 100087China
Latent Dirichlet allocation(LDA)is a topic model widely used for discovering hidden semantics in massive text *** Gibbs sampling(CGS),as a widely-used algorithm for learning the parameters of LDA,has the risk of priva... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Performance Study of membership inference attacks on Different Machine Learning Algorithms
收藏 引用
Journal of Information Hiding and Privacy Protection 2021年 第4期3卷 193-200页
作者: Jumana Alsubhi Abdulrahman Gharawi Mohammad Alahmadi Department of Computer Science University of GeorgiaAthensGA30602USA Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah23890Saudi Arabia
Nowadays,machine learning(ML)algorithms cannot succeed without the availability of an enormous amount of training *** data could contain sensitive information,which needs to be *** inference attacks attempt to find ou... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论