Alert button

Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks

Add code
Bookmark button
Alert button
Jun 23, 2020
Lixin Fan, Kam Woh Ng, Ce Ju, Tianyu Zhang, Chang Liu, Chee Seng Chan, Qiang Yang

Figure 1 for Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks
Figure 2 for Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks
Figure 3 for Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks
Figure 4 for Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: