Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks
Authors: Lixin Fan, Kam Woh Ng, Ce Ju, Tianyu Zhang, Chang Liu, Chee Seng Chan, Qiang Yang | Published: 2020-06-20 | Updated: 2020-06-23
Algorithm Design
Poisoning
Privacy Protection in Machine Learning