[1]钱汉伟, 彭季天, 袁明, 等. 影响预训练语言模型数据泄露的因素研究. 信息安全研究[J], 2025, 11(2): 181188[2]Dwork C. Differential privacy[C] Proc of the 33rd Int Colloquium on Automata, Languages, and Programming. Berlin: Springer, 2006: 112[3]Abadi M, Chu A, Goodfellow I, et al. Deep learning with differential privacy[C] Proc of the 2016 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2016: 308318[4]Stock P, Shilov I, Mironov I, et al. Defending against reconstruction attacks withrényi differential privacy[JOL]. 2022 [20250319]. https:arxiv.orgpdf2202.07623[5]Mironov I. Renyi differential privacy[C] Proc of the 30th Computer Security Foundations Symposium. Piscataway, NJ: IEEE, 2017: 263275[6]Xu Chugui, Ren Ju, Zhang Deyu, et al. GANobfuscator: Mitigating information leakage under GAN via differential privacy[J]. IEEE Trans on Information Forensics and Security, 2019, 14(9): 23582371[7]Igamberdiev T, Habernal I. DPBART for privatized text rewriting under local differential privacy[C] Proc of the 2023 Annual Meeting of the Association for Computational Linguistics. Stroudsburg, PA: ACL, 2023[8]Huang Xixi, Guan Jian, Zhang Bin, et al. Differentially private convolutional neural networks with adaptive gradient descent[C] Proc of the 4th IEEE Int Conf on Data Science in Cyberspace. Piscataway, NJ: IEEE, 2019: 642648[9]Yu D, Naik S, Backurs A, et al. Differentially private finetuning of language models[C] Proc of the 10th Int Conf on Learning Representations. Kigali, Rwanda: ICLR, 2022[10]余方超, 方贤进, 张又文, 等. 增强深度学习中的差分隐私防御机制[J]. 南京大学学报: 自然科学, 2021, 57(1): 1020[11]Yue Xiang, Inan H A, Li Xuechen, et al. Synthetic text generation with differential privacy: A simple and practical recipe[C] Proc of the 24th Annual Int Symp on Computer Architecture. Stroudsburg, PA: ACL, 2023[12]Fernandes N, Dras M, McIver A. Generalised differential privacy for text document processing[G] LNCS 11426: Proc of the 8th Int Conf on Principles of Security and Trust. Berlin: Springer, 2019: 123148[13]Sasada T, Kawai M, Taenaka Y,et al. Differentiallyprivate text generation via text preprocessing to reduce utility loss[C] Proc of the 2021 Int Conf on Artificial Intelligence in Information and Communication. Piscataway, NJ: IEEE, 2021: 042047[14]Ponomareva N, Hazimeh H, Kurakin A, et al. How to DPfy ML: A practical guide to machine learning with differential privacy[J]. Journal of Artificial Intelligence Research, 2023, 77: 11131201[15]Carlini N, Liu C, Erlingsson , et al. The secret sharer: Evaluating and testing unintended memorization in neural networks[C] Proc of the 28th USENIX Security Symposium. Berkeley, CA: USENIX Association, 2019[16]Carlini N, Tramèr F, Brown T, et al. Extracting training data from large language models[C] Proc of the 30th USENIX Security Symposium. Berkeley, CA: USENIX Association, 2021: 267284
|