计算机科学 ›› 2023, Vol. 50 ›› Issue (1): 302-317.doi: 10.11896/jsjkx.220800227
陈得鹏1, 刘肖1, 崔杰1, 何道敬2
CHEN Depeng1, LIU Xiao1, CUI Jie1, HE Daojing2
摘要: 随着机器学习的不断发展,特别是在深度学习领域,人工智能已经融入到人们日常生活的方方面面。机器学习模型被部署到多种场景的应用中,提升了传统应用的智能化水平。然而,近年来的研究指出,用于训练机器学习模型的个人数据时常面临隐私泄露的风险。其中,成员推理攻击就是针对机器学习模型威胁用户隐私安全的一种非常重要的攻击方式。成员推理攻击的目的是判断用户数据样本是否被用于训练目标模型(如在医疗、金融等领域的用户数据),从而直接干涉到用户隐私信息。首先介绍了成员推理攻击的相关背景知识,随后对现有的成员推理攻击按照攻击者是否拥有影子模型进行分类,并对成员推理攻击在不同领域的威胁进行了相应的总结。其次,介绍了应对成员推理攻击的防御手段,对现有的防御机制按照模型过拟合、基于模型压缩和基于扰动等策略进行分类和总结。最后,对现有的成员推理攻击和防御机制的优缺点进行了分析,并提出了成员推理攻击的一些潜在的研究方向。
中图分类号:
[1]CHEN X,CHO Y H,DOU Y,et al.Predicting Future Earnings Changes Using Machine Learning and Detailed Financial Data[J].Journal of Accounting Research,2022,60(2):467-515. [2]ZHANG Z,YAN C,MALIN B A.Membership Inference At-tacks against Synthetic Health Data [J].Journal of Biomedical Informatics,2022,125:103977. [3]PYRGELIS A,TRONCOSO C,CRISTOFARO E D.Knock Knock,Who's There? Membership Inference on Aggregate Location Data[J].arXiv:1708.06145,2017. [4]TABASSI E,BURNS K,HADJIMICHAEL M,et al.A Taxonomy and Terminology of Adversarial Machine Learning[OL].https://doi.org/10.6028/NIST.IR.8269-draft. [5]WACHTER S,MITTELSTADT B,FLORIDI L.Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation [J].International Data Privacy Law,2017,7(2):76-99. [6]SHOKRI R,STRONATI M,SONG C,et al.Membership Inference Attacks against Machine Learning Models [C]//Sympo-sium on Security and Privacy.2017:3-18. [7]LONG Y,BINDSCHAEDLER V,LEI W,et al.Understanding Membership Inferences on Well-Generalized Learning Models [J].arXiv:1802.04889,2018. [8]IROLLA P,CHTEL G.Demystifying the Membership Inference Attack [C]//Conference on Cybersecurity and Privacy.2019:1-7. [9]SALEM A,ZHANG Y,HUMBERT M,et al.ML-Leaks:Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models [C]//Network and Distri-buted System Security Symposium.2019:1-15. [10]REZAEI S,LIU X.An Efficient Subpopulation-based Membership Inference Attack[J].arXiv:2203.02080,2022. [11]LIU G,WANG C,PENG K,et al.SocInf:Membership Infe-rence Attacks on Social Media Health Data With Machine Learning [J].IEEE Transactions on Computational Social Systems,2019,6(5):907-921. [12]TRUEX S,LIU L,GURSOY M E,et al.Demystifying Membership Inference Attacks in Machine Learning as a Service [J].IEEE Transactions on Services Computing,2019,14(6):2073-2089. [13]SABLAYROLLES A,DOUZE M,OLLIVIER Y,et al.White-box vs Black-box:Bayes Optimal Strategies for Membership Inference [C]//Proceedings of International Conference on Machine Learning.2019:5558-5567. [14]NASR M,SHOKRI R,HOUMANSADR A.Comprehensive Privacy Analysis of Deep Learning:Passive and Active White-box Inference Attacks against Centralized and Federated Learning [C]//Symposium on Security and Privacy.2019:739-753. [15]SONG L,SHOKRI R,MITTAL P.Privacy Risks of Securing Machine Learning Models against Adversarial Examples [C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.2019:241-257. [16]LI G,REZAEI S,LIU X.User-Level Membership Inference Attack against Metric Embedding Learning [J].arXiv:2203.02077,2022. [17]LIU H,JIA J,QU W,et al.EncoderMI:Membership Inference against Pre-trained Encoders in Contrastive Learning [C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.2021:2081-2095. [18]LI Z,ZHANG Y.Membership Leakage in Label-Only Expo-sures [C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.2021:880-895. [19]SONG L,MITTAL P.Systematic Evaluation of Privacy Risks of Machine Learning Models [C]//Proceedings of USENIX Secu-rity Symposium.2021:2615-2632. [20]RAHIMIAN S,OREKONGDY T.Differential Privacy Defenses and Sampling Attacks for Membership Inference [C]//Procee-dings of ACM Workshop on Artificial Intelligence and Security.2021:193-202. [21]HUI B,YANG Y,YUAN H,et al.Practical Blind Membership Inference Attack via Differential Comparisons[C]//Network and Distributed System Security Symposium.2021:1-17. [22]LEINO K,FREDRIKSON M.Stolen Memories:LeveragingModel Memorization for Calibrated White-Box Membership Inference [C]//Proceedings of USENIX Security Symposium.2020:1605-1622. [23]CHOO C C A,TRAMER F,CARLINI N,et al.Label-OnlyMembership Inference Attacks [C]//Proceedings of International Conference on Machine Learning.2021:1964-1967. [24]JIA J,SALEM A,BACKES M,et al.MemGuard:Defendingagainst Black-Box Membership Inference Attacks via Adversa-rial Examples[C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.2019:259-274. [25]YEOM S,GIACOMELLI I,FREDRIKSON M,et al.PrivacyRisk in Machine Learning:Analyzing the Connection to Overfitting [C]//IEEE Computer Security Foundations Symposium.2018:268-282. [26]REZAEI S,SHAFIQ Z,LIU X.Accuracy-Privacy Trade-off in Deep Ensemble:A Membership Inference Perspective [J].ar-Xiv:2105.05381,2021. [27]GROSSO G D,JALALZAI H,PICHLER G,et al.LeveragingAdversarial Examples to Quantify Membership Information Leakage [C]//Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.2022:1-13. [28]SHAFRAN A,PELEG S,HOSHEN Y.Membership Inference Attacks are Easier on Difficult Problems [C]//International Conference on Computer Vision.2021:14820-14829. [29]YUAN X,ZHANG L.Membership Inference Attacks and Defenses in Neural Network Pruning [C]//Proceedings of USENIX Security Symposium.2022:4561-4578. [30]HAYES J,MELIS L,DANEZIS G,et al.LOGAN:Membership Inference Attacks Against Generative Models [J].Proceedings on Privacy Enhancing Technologies,2019,(1):133-135. [31]HILPRECHT B,HRTERICH M,BERNAU D.Reconstruction and Membership Inference Attacks against Generative Models [J].Proceedings Privacy Enhancing Technologies,2019,(4):232-249. [32]LIU K S,XIAO C,LI B,et al.Performing Co-Membership Attacks Against Deep Generative Models [C]//International Conference on Data Mining.2019:459-467. [33]CHEN D,YU N,ZHANG Y,et al.GAN-Leaks:A Taxonomy of Membership Inference Attacks against Generative Models [C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.2020:343-362. [34]WEBSTER R,RABIN J,SIMON L,et al.This Person(Probably) Exists.Identity Membership Attacks Against GAN Gene-rated Faces [J].arXiv:2107.06018,2021. [35]HU H,PANG J.Membership Inference Attacks against GANs by Leveraging Over-representation Regions [C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.2021:2387-2389. [36]CHEN J,ZHANG J,ZHAO Y,et al.Beyond Model-Level Membership Privacy Leakage:an Adversarial Approach in Federated Learning [C]//International Conference on Computer Communications and Networks.2020:1-9. [37]MELIS L,SONG C,CRISTOFARO E D,et al.Exploiting Unintended Feature Leakage in Collaborative Learning [C]//IEEE Symposium on Security and Privacy.Piscataway,2019:691-706. [38]ZHANG J,ZHANG J,CHEN J,et al.GAN Enhanced Membership Inference:A Passive Local Attack in Federated Learning [C]//IEEE International Conference on Communications.2020:1-6. [39]HU H,SALCIC Z,SUN L,et al.Source Inference Attacks in Federated Learning [C]//IEEE International Conference on Data Mining.2021:1102-1107. [40]PICHLER G,ROMANELLI M,VEGA L R,et al.Perfectly Accurate Membership Inference by a Dishonest Central Server in Federated Learning [J].arXiv:2203.16463,2022. [41]CHEN H,LI H,DONG G,et al.Practical Membership Inference Attack Against Collaborative Inference in Industrial IoT [J].IEEE Transactions on Industrial Informatics,2020,18(1):477-487. [42]ZHANG G,LIU B,ZHU T,et al.Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models [J/OL].IEEE Transactions on Dependable and Secure Computing.https://ieeexplore.ieee.org/abstract/document/9723588. [43]HE Y,RAHIMIAN S,SCHIELE B,et al.Segmentations-Leak:Membership Inference Attacks and Defenses in Semantic Image Segmentation [C]//European Conference on Computer Vision.2020:519-535. [44]ZHANG M,REN Z,WANG Z,et al.Membership Inference Attacks Against Recommender Systems [C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.2021:864-879. [45]WANG Y,HUANG L,YU P S,et al Membership Inference Attacks on Knowledge Graphs [J].arXiv:2104.08273,2021. [46]SHAH M A,SZURLEY J,MUELLER M,et al.Evaluating the Vulnerability of End-to-End Automatic Speech Recognition Models to Membership Inference Attacks [C]//Interspeech.2021:891-895. [47]MIAO Y,XUE M,CHEN C,et al.The Audio Auditor:User-Level Membership Inference in Internet of Things Voice Ser-vices [C]//Proceedings on Privacy Enhancing Technologies.2021:209-228. [48]OLATUNJI I E,NEJDL W,KHOSLA M.Membership Infe-rence Attack on Graph Neural Networks [J].arXiv:2101.06570,2021. [49]WU B,YANG X,PAN S,et al.Adapting Membership Inference Attacks to GNN for Graph Classification:Approaches and Implications [C]//IEEE International Conference on Data Mining.2021:1421-1426. [50]HE X,WEN R,WU Y,et al.Node-Level Membership Inference Attacks Against Graph Neural Networks [J].arXiv:2102.05429,2021. [51]ZHANG Z,CHEN M,BACKES M,et al.Inference Attacksagainst Graph Neural Networks [C]//Proceedings of USENIX Security Symposium.2022:1-18. [52]DUDDU V,BOUTET A,SHEJWALKAR V.Quantifying Privacy Leakage in Graph Embedding [C]//International Confe-rence on Mobile and Ubiquitous Systems:Computing,Networking and Services.2020:76-85. [53]SONG C,RAGHUNATHAN A.Information Leakage in Em-bedding Models [C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.2020:377-390. [54]HISAMOTO S,POST M,DUH K.Membership Inference At-tacks on Sequence-to-Sequence Models:Is My Data in Your Machine Translation System? [J].Transactions of the Association for Computational Linguistics,2020,8:49-63. [55]YANG Y,GOHARI P,TOPCU U.On The Vulnerability of Recurrent Neural Networks to Membership Inference Attacks[J].arXiv:2110.03054,2021. [56]THOMAS A,ADELANI D I,DAVODY A,et al.Investigating the Impact of Pre-trained Word Embeddings on Memorization in Neural Networks [C]//International Conference on Text,Speech,and Dialogue.2020:273-281. [57]MAHLOUJIFAR S,INAN H A,CHASE M,et al.Membership Inference on Word Embedding and Beyond [J].arXiv:2106.11384,2021. [58]MIRESHGHALLAH F,GOYAL K,UNIYAL A,et al.Quantifying Privacy Risks of Masked Language Models Using Membership Inference Attacks [J].arXiv:2203.03929,2022. [59]CHEN J,WANG W H,SHI X.Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data [C]//Proceedings of the Pacific Symposium.2020:26-37. [60]BAGMAR A,MAIYA S R,BIDWALKA S,et al.Membership Inference Attacks on Lottery Ticket Networks [J].arXiv:2108.03506,2021 [61]GUPTA U,STRIPELIS D,LAM P K,et al.Membership Infe-rence Attacks on Deep Regression Models for Neuroimaging [C]//Proceedings of the Fourth Conference on Medical Imaging with Deep Learning.2021:228-251. [62]JAGANNATHA A,RAWAT B,YU H.Membership Inference Attack Susceptibility of Clinical Language Models [J].arXiv:2104.08305,2021. [63]YE J,MADDI A,MURAKONDA S K,et al.Enhanced Membership Inference Attacks against Machine Learning Models [J].arXiv:2111.09679,2021. [64]ZOU Y,ZHANG Z,BACKES M,et al.Privacy Analysis of Deep Learning in the Wild:Membership Inference Attacks against Transfer Learning [J].arXiv:2009.04872,2020. [65]CHEN C,WU B,QIU M,et al.A Comprehensive Analysis of Information Leakage in Deep Transfer Learning [J].arXiv:2009.01989,2020. [66]REZAEI S,LIU X.On the Difficulty of Membership Inference Attacks [C]//Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.2021:7892-7900. [67]HINTERSDORF D,STRUPPEK L,KERSTING K.Do NotTrust or Not To Trust Prediction Scores for MembershipInfe-rence Attacks [J].arXiv:2111.09076,2021. [68]LI J,LI N,RIBEIRO B.Membership Inference Attacks and Defenses in Classification Models [C]//Proceedings of the Ele-venth ACM Conference on Data and Application Security and Privacy.2021:5-16. [69]SRIVASTAVA N,HINTON G,KRIZHEVSKY A,et al.Dropout:A Simple Way to Prevent Neural Networks from Overfitting [J].Journal of Machine Learning Research,2014,15(1):1929-1958. [70]CARUANA R,LAWRENCE S,GILES C.Overfitting in Neural Nets:Backpropagation,Conjugate Gradient,and Early Stopping[C]//Neural Information Proceedings Systems.2000:402-408. [71]HINTON G,VINYALS O,DEAN J.Distilling the Knowledge in a Neural Network [J].Computer Science,2015,14(7):38-39. [72]KAYA Y,DUMITRAS T.When Does Data AugmentationHelpwith Membership Inference Attacks? [C]//International Conference on Machine Learning.2021:5345-5355. [73]YU D,ZHANG H,CHEN W,et al.How Does Data Augmentation Affect Privacy in Machine Learning? [C]//Proceedings of AAAI Conference on Artificial Intelligence.2021:10746-10753. [74]KAYA Y,HONG S,DUMITRAS T.On the Effectiveness of Regularization Against Membership Inference Attacks [J].ar-Xiv:2006.05336,2020. [75]NASR M,SHOKRI R,HOUMANSADR A.Machine Learning with Membership Privacy using Adversarial Regularization[C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.2018:634-646. [76]CHEN D,YU N,FRITZ M.RelaxLoss:Defending Membership Inference Attacks without Losing Utility [C]//Proceedings of International Conference on Learning Representations.2022:1-28. [77]LIU Y,WEN R,HE X,et al.ML-Doctor:Holistic Risk Assessment of Inference Attacks Against Machine Learning Models [C]//Proceedings of USENIX Security Symposium.2021:4525-4542. [78]ZHENG J,CAO Y,WANG H.Resisting Membership Inference Attacks through Knowledge Distillation [J].Neurocomputing,2021,452(3):114-126. [79]SHEJWALKAR V,HOUMANSADR A.Membership Privacyfor Machine Learning Models Through Knowledge Transfer [J].arXiv:1906.06589,2019. [80]WANG Y,WANG C,WANG Z,et al.Against Membership Inference Attack:Pruning is All You Need [C]//International Joint Conference on Artificial Intelligence.2021:3141-3147. [81]DWORK C,ROTH A.The algorithmic foundations of differen-tial privacy [J].Foundations Trends in Theoretical Computer Science,2014,9(3/4):211-407. [82]ABADI M,CHU A,GOODFELLOW I,et al.Deep Learningwith Differential Privacy [C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.2016:308-318. [83]RAHMAN M A,RAHMAN T,LAGANIÈRE R,et al.Membership Inference Attack against Differentially Private Deep Learning Model [J].Transactions on Data Privacy,2018,11(1):61-79. [84]JAGIELSKI M,ULLMAN J,OPREA A.Auditing Differentially Private Machine Learning:How Private is Private SGD?[C]//Conference on Neural Information Proceedings Systems.2020:22205-22216. [85]TRUEX S,LIU L,GURSOY M E,et al.Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability[C]//IEEE International Conference on Trust,Privacy and Security in Intelligent Systems and Applications.2019:82-91. [86]NASERI M,HAYES J,CRISTOFARO E D.Local and Central Differential Privacy for Robustness and Privacy in Federated Learning [J].arXiv:2009.03561,2020. [87]BERNAU D,ROBL J,GRASSAL P W,et al.Comparing Local and Central Differential Privacy Using Membership Inference Attacks[C]//Annual Conference on Data and Applications Security and Privacy.2021:22-42. [88]JAYARAMAN B,EVANS D.Evaluating Differentially Private Machine Learning in Practice [C]//Proceedings of USENIX Security Symposium.2019:1895-1912. [89]ZHANG B,YU R,SUN H,et al.Privacy for All:DemystifyVulnerability Disparity of Differential Privacy against Membership Inference Attack [J].arXiv:2001.08855,2020. [90]XIONG A,WANG T,LI N,et al.Towards Effective Differential Privacy Communication for Users′ Data Sharing Decision and Comprehension [C]//IEEE Symposium on Security and Privacy.2020:392-410. [91]NASR M,SONG S,THAKURTA A,et al.Adversary Instantiation:Lower Bounds for Differentially Private Machine Learning [C]//IEEE Symposium on Security and Privacy.2021:866-882. [92]CHEN Q,XIANG C,XUE M,et al.Differentially Private Data Generative Models [J].arXiv:1812.02274,2018. [93]WUNDERLICH D,BERNAU D,ALDÀ F,et al.On the Privacy-utility Trade-off in Differentially Private Hierarchical Text Classification [J].arXiv:2103.02895,2021. [94]HUMPHRIES T,RAFUSE M,TULLOCH L,et al.Differen-tially Private Learning Does Not Bound Membership Inference [J].arXiv:2010.12112,2020. [95]MAHLOUJIFAR S,SABLAYROLLES A,CORMODE G,et al.Optimal Membership Inference Bounds for Adaptive Composition of Sampled Gaussian Mechanisms [J].arXiv:2204.06106,2022. [96]LIU B,DING M,SHAHAM S,et al.When Machine Learning Meets Privacy:A Survey and Outlook[J].ACM Computing Surveys,2021,54(2):1-36. [97]YANG Z,SHAO B,XUAN B,et al.Defending Model Inversion and Membership Inference Attacks via Prediction Purification [J].arXiv:2005.03915,2020. [98]HOU J,QIAN J,WANG Y,et al.ML Defense:against Prediction API Threats in Cloud-based Machine Learning Service [C]//Proceedings of the International Symposium on Quality of Service.2019:1-10. [99]HANZLIK L,ZHANG Y,GROSSE K,et al.MLCapsule:Guar-ded Offline Deployment of Machine Learning as a Service [C]//Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.2021:3300-3309. [100]WU B,ZHAO S,CHEN C,et al.Generalization in Generative Adversarial Networks:A Novel Perspective from Privacy Protection[C]//Advances in Neural Information Proceedings Systems 32.2019:1-11. [101]MUKHERJEE S,XU Y,TRIVEDI A,et al.privGAN:Protecting GANs from Membership Inference Attacks at Low Cost to Utility[J].Proceedings on Privacy Enhancing Technologies,2021(3):142-163. [102]PAUL W,CAO Y,ZHANG M,et al.Defending Medical Image Diagnostics against Privacy Attacks using Generative Methods[J].arXiv:2103.03078,2021. [103]WEBSTER R,RABIN J,SIMON L,et al.Generating Private Data Surrogates for Vision Related Tasks[C]//International Conference on Pattern Recognition.2021:263-269. [104]HU L,LI J,LIN G,et al.Defending against Membership Infe-rence Attacks with High Utility by GAN [J/OL].IEEE Transactions on Dependable and Secure Computing.https://ieeexplore.ieee.org/document/9773984/authors#authors. [105]YANG R,MA J,MIAO Y,et al.Privacy-preserving Generative Framework Against Membership Inference Attacks [J].arXiv:2202.05469,2022. [106]ALVAR S R,WANG L,PEI J,et al.Membership Privacy Protection for Image Translation Models via Adversarial Knowledge Distillation [J].arXiv:2203.05212,2022. [107]CHEN J,WANG W,GAO H,et al.PAR-GAN:Improving the Generalization of Generative Adversarial Networks Against Membership Inference Attacks [C]//Proceedings of ACM SIGKDD Conference on Knowledge Discovery & Data Mining.2021:127-137. [108]PAPERNOT N,ABADI M,ERLINGSSON L,et al.Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data [J].arXiv:1610.05755,2016. [109]PAPERNOT N,SONG S,MIRONOV I,et al.Scalable Private Learning with PATE [J].arXiv:1802.08908,2018. [110]SAEIDIAN S,CERVIA G,OECHTERING T J,et al.Quanti-fying Membership Privacy via Information Leakage [J].IEEE Transactions on Information Forensics and Security,2021,16:3096-3108. [111]HUANG H,LUO W,ZENG G,et al.DAMIA:Leveraging Domain Adaptation as a Defense against Membership Inference Attacks [J].IEEE Transactions on Dependable and Secure Computing,2022,19(5):3183-3199. [112]TOPLE S,SHARMA A,NORI A.Alleviating Privacy Attacks via Causal Learning[C]//Proceedings of International Confe-rence on Machine Learning.2020:9537-9547. [113]YIN Y,CHEN K,SHOU L,et al.Defending Privacy Against More Knowledgeable Membership Inference Attackers [C]//Proceedings of ACM SIGKDD Conference on Knowledge Discovery & Data Mining.2021:2026-2036. [114]LEE H,KIM J,AHN S,et al.Digestive neural networks:A novel defense strategy against inference attacks in federated lear-ning[J].Computers & Security,2021,109:102378. [115]TANG X,MAHLOUJIFAR S,SONG L,et al.Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture [J].arXiv:2110.08324,2021. [116]JARIN I,ESHETE B.MIAShield:Defending Membership Infe-rence Attacks via Preemptive Exclusion of Members [J].arXiv:2203.00915,2022. |
[1] | 王艺潭, 王一舒, 袁野. 学习索引研究综述 Survey of Learned Index 计算机科学, 2023, 50(1): 1-8. https://doi.org/10.11896/jsjkx.211000149 |
[2] | 徐苗苗, 陈珍萍. 基于对称加密和双层真值发现的连续群智感知激励机制 Incentive Mechanism for Continuous Crowd Sensing Based Symmetric Encryption and Double Truth Discovery 计算机科学, 2023, 50(1): 294-301. https://doi.org/10.11896/jsjkx.220400101 |
[3] | 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩. 基于分层抽样优化的面向异构客户端的联邦学习 Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients 计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263 |
[4] | 冷典典, 杜鹏, 陈建廷, 向阳. 面向自动化集装箱码头的AGV行驶时间估计 Automated Container Terminal Oriented Travel Time Estimation of AGV 计算机科学, 2022, 49(9): 208-214. https://doi.org/10.11896/jsjkx.210700028 |
[5] | 宁晗阳, 马苗, 杨波, 刘士昌. 密码学智能化研究进展与分析 Research Progress and Analysis on Intelligent Cryptology 计算机科学, 2022, 49(9): 288-296. https://doi.org/10.11896/jsjkx.220300053 |
[6] | 汤凌韬, 王迪, 张鲁飞, 刘盛云. 基于安全多方计算和差分隐私的联邦学习方案 Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy 计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108 |
[7] | 吕由, 吴文渊. 隐私保护线性回归方案与应用 Privacy-preserving Linear Regression Scheme and Its Application 计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190 |
[8] | 何强, 尹震宇, 黄敏, 王兴伟, 王源田, 崔硕, 赵勇. 基于大数据的进化网络影响力分析研究综述 Survey of Influence Analysis of Evolutionary Network Based on Big Data 计算机科学, 2022, 49(8): 1-11. https://doi.org/10.11896/jsjkx.210700240 |
[9] | 李瑶, 李涛, 李埼钒, 梁家瑞, Ibegbu Nnamdi JULIAN, 陈俊杰, 郭浩. 基于多尺度的稀疏脑功能超网络构建及多特征融合分类研究 Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network 计算机科学, 2022, 49(8): 257-266. https://doi.org/10.11896/jsjkx.210600094 |
[10] | 张光华, 高天娇, 陈振国, 于乃文. 基于N-Gram静态分析技术的恶意软件分类研究 Study on Malware Classification Based on N-Gram Static Analysis Technology 计算机科学, 2022, 49(8): 336-343. https://doi.org/10.11896/jsjkx.210900203 |
[11] | 陈明鑫, 张钧波, 李天瑞. 联邦学习攻防研究综述 Survey on Attacks and Defenses in Federated Learning 计算机科学, 2022, 49(7): 310-323. https://doi.org/10.11896/jsjkx.211000079 |
[12] | 李亚茹, 张宇来, 王佳晨. 面向超参数估计的贝叶斯优化方法综述 Survey on Bayesian Optimization Methods for Hyper-parameter Tuning 计算机科学, 2022, 49(6A): 86-92. https://doi.org/10.11896/jsjkx.210300208 |
[13] | 赵璐, 袁立明, 郝琨. 多示例学习算法综述 Review of Multi-instance Learning Algorithms 计算机科学, 2022, 49(6A): 93-99. https://doi.org/10.11896/jsjkx.210500047 |
[14] | 肖治鸿, 韩晔彤, 邹永攀. 基于多源数据和逻辑推理的行为识别技术研究 Study on Activity Recognition Based on Multi-source Data and Logical Reasoning 计算机科学, 2022, 49(6A): 397-406. https://doi.org/10.11896/jsjkx.210300270 |
[15] | 姚烨, 朱怡安, 钱亮, 贾耀, 张黎翔, 刘瑞亮. 一种基于异质模型融合的 Android 终端恶意软件检测方法 Android Malware Detection Method Based on Heterogeneous Model Fusion 计算机科学, 2022, 49(6A): 508-515. https://doi.org/10.11896/jsjkx.210700103 |
|