Alert button

Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks

Jun 20, 2020
Lixin Fan, Kam Woh Ng, Ce Ju, Tianyu Zhang, Chang Liu, Chee Seng Chan, Qiang Yang

Figure 1 for Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks
Figure 2 for Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks
Figure 3 for Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks
Figure 4 for Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: