DC Field | Value | Language |
---|---|---|
dc.contributor.author | Na, Seung Ho | ko |
dc.contributor.author | Hong, Hyeong Gwon | ko |
dc.contributor.author | Kim, Junmo | ko |
dc.contributor.author | Shin, Seungwon | ko |
dc.date.accessioned | 2022-11-24T23:00:23Z | - |
dc.date.available | 2022-11-24T23:00:23Z | - |
dc.date.created | 2022-11-19 | - |
dc.date.issued | 2022-12 | - |
dc.identifier.citation | Annual Computer Security Applications Conference, ACSAC 2022 | - |
dc.identifier.uri | http://hdl.handle.net/10203/300925 | - |
dc.language | English | - |
dc.publisher | ACSAC | - |
dc.title | Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint | - |
dc.type | Conference | - |
dc.type.rims | CONF | - |
dc.citation.publicationname | Annual Computer Security Applications Conference, ACSAC 2022 | - |
dc.identifier.conferencecountry | US | - |
dc.identifier.conferencelocation | AT&T Conference Center, Austin, Texas | - |
dc.contributor.localauthor | Kim, Junmo | - |
dc.contributor.localauthor | Shin, Seungwon | - |
dc.contributor.nonIdAuthor | Na, Seung Ho | - |
dc.contributor.nonIdAuthor | Hong, Hyeong Gwon | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.