{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T02:18:43Z","timestamp":1691029123794},"reference-count":8,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2021,6,1]]},"DOI":"10.1587\/transinf.2021edl8007","type":"journal-article","created":{"date-parts":[[2021,5,31]],"date-time":"2021-05-31T22:41:13Z","timestamp":1622500873000},"page":"905-908","source":"Crossref","is-referenced-by-count":1,"title":["Differentially Private Neural Networks with Bounded Activation Function"],"prefix":"10.1587","volume":"E104.D","author":[{"given":"Kijung","family":"JUNG","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Korea University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hyukki","family":"LEE","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Korea University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yon Dohn","family":"CHUNG","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Korea University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] K. He, X. Zhang, S. Ren, and J. Sun, \u201cDelving deep into rectifiers: Surpassing human-level performance on imagenet classification,\u201d Proceedings of the IEEE international conference on computer vision, pp.1026-1034, 2015. 10.1109\/iccv.2015.123","DOI":"10.1109\/ICCV.2015.123"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] M. Fredrikson, S. Jha, and T. Ristenpart, \u201cModel inversion attacks that exploit confidence information and basic countermeasures,\u201d Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.1322-1333, 2015. 10.1145\/2810103.2813677","DOI":"10.1145\/2810103.2813677"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[4] M. Abadi, A. Chu, I. Goodfellow, H.B. McMahan, I. Mironov, K. Talwar, and L. Zhang, \u201cDeep learning with differential privacy,\u201d Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.308-318, 2016. 10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"key":"4","unstructured":"[5] N. Papernot, et al., \u201cTempered sigmoid activations for deep learning with differential privacy,\u201d arXiv preprint arXiv:2007.14191, 2020."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[6] Q. Geng and P. Viswanath, \u201cThe optimal mechanism in differential privacy,\u201d 2014 IEEE international symposium on information theory, IEEE, pp.2371-2375, 2014. 10.1109\/isit.2014.6875258","DOI":"10.1109\/ISIT.2014.6875258"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[7] I. Mironov, \u201cR\u00e9nyi differential privacy,\u201d 2017 IEEE 30th Computer Security Foundations Symposium, IEEE, pp.263-275, 2017. 10.1109\/csf.2017.11","DOI":"10.1109\/CSF.2017.11"},{"key":"7","unstructured":"[8] I. Mironov, et al., \u201cR\u00e9nyi differential privacy of the sampled Gaussian mechanism,\u201d arXiv preprint arXiv:1908.10530, 2019."},{"key":"8","unstructured":"[9] http:\/\/yann.lecun.com\/exdb\/mnist\/, accessed Jan. 2021."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E104.D\/6\/E104.D_2021EDL8007\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,5]],"date-time":"2021-06-05T06:19:15Z","timestamp":1622873955000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E104.D\/6\/E104.D_2021EDL8007\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,1]]},"references-count":8,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2021edl8007","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,1]]}}}