Querying Little Is Enough: Model Inversion Attack via Latent Information

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ML4CS (3. : 2020 : Kanton, Stadt) Machine learning for cyber security ; Part 2
1. Verfasser: Mo, Kanghua (VerfasserIn)
Weitere Verfasser: Huang, Teng (VerfasserIn), Xiang, Xiaoyu (VerfasserIn)
Pages:2
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Vulnerability Variants and Path Factors in Networks 2020 Zhu, Linli
Research on Progress and Inspiration of Entity Relation Extraction in English Open Domain 2020 Jian, Xu
Covid-19 Public Opinion Analysis Based on LDA Topic Modeling and Data Visualization 2020 Chen, Li
A Multi-objective Ant Colony Optimization Algorithm with Local Optimum Avoidance Strategy 2020 Wu, Ying
Education for Bilingual Children in the Age of Artificial Intelligence 2020 Zhou, Weiwei
GF-Attack: A Strategy to Improve the Performance of Adversarial Example 2020 Zhang, Jintao
Adversarial Text Generation via Probability Determined Word Saliency 2020 Ma, Gang
A Variant of Sun Toughness and the Existence of Path Factors in Networks 2020 Zhu, Linli
Finite-Time Consensus of Second-Order Multi-agent Systems with External Disturbances and Without Velocity Measurements 2020 Li, Yuling
Research on the Construction of College Campus Sports Culture and the Participation of College Students in Sports Activities 2020 Li, Guan
Group Movement of Multi-agent Systems with Diverse Delays 2020 Yang, Yize
Online Task Allocation in Mobile Crowdsensing with Sweep Coverage and Stability Control 2020 Duan, Jiaang
A New Health Assessment Approach of Lithium-Ion Batteries Under Variable Operation Conditions 2020 Hong, Sheng
A Capacitated Vehicle Routing Problem with Order Release Time Based on a Hybrid Harmony Search 2020 Liu, Ling
A Survey of Researches on Personalized Bundle Recommendation Techniques 2020 Li, Miao
An Overview of Key Technologies and Challenges of 6G 2020 Liu, Qingling
AdvJND: Generating Adversarial Examples with Just Noticeable Difference 2020 Zhang, Zifei
War: An Efficient Pre-processing Method for Defending Adversarial Attacks 2020 Yin, Zhaoxia
A High-Recall Membership Inference Attack Based on Confidence-Thresholding Method with Relaxed Assumption 2020 Wang, Lulu
A Poisoning Attack Against the Recognition Model Trained by the Data Augmentation Method 2020 Yang, Yunhao
Alle Artikel auflisten