|
[1] E. Alpaydin, “Introduction to Machine Learning,” The MIT Press2014. [2] D. Anguita, A. Ghio, L. Oneto, X. Parra, and J.L. Reyes-Ortiz, “Human Activity Recognition on Smartphones Using a Multiclass Hardware-Friendly Support Vector Machine,” Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 216-223. [3] M.W. Gardner, and S. Dorling, “Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences,” Atmospheric environment, 32,1998, pp.2627-2636. [4] X. Glorot, and Y. Bengio, “Understanding the difficulty of training deep feedforward neural networks,” Proceedings of the thirteenth international conference on artificial intelligence and statistics, 2010, pp. 249-256. [5] X. Glorot, A. Bordes, and Y. Bengio, “Deep sparse rectifier neural networks,” Proceedings of the fourteenth international conference on artificial intelligence and statistics, 2011, pp. 315-323. [6] I.J. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, “Generative adversarial nets,” Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2, MIT Press, Montreal, Canada, 2014, pp. 2672-2680. [7] C.J. Hoofnagle, B. van der Sloot, and F.Z. Borgesius, “The European Union general data protection regulation: what it is and what it means,” Information & Communications Technology Law, 28,2019, pp.65-98. [8] A. Krizhevsky, I. Sutskever, and G.E. Hinton, “Imagenet classification with deep convolutional neural networks,” Advances in neural information processing systems, 2012, pp. 1097-1105. [9] B. Meden, Ž. Emeršič, V. Štruc, and P. Peer, “k-Same-Net: k-Anonymity with Generative Deep Neural Networks for Face Deidentification,” Entropy, 20,2018, pp.60. [10] D.E. Rumelhart, G.E. Hinton, and R.J. Williams, “Learning representations by back-propagating errors,” Nature, 323,1986, pp.533-536. [11] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout: a simple way to prevent neural networks from overfitting,” The journal of machine learning research, 15,2014, pp.1929-1958. [12] L. Sweeney, “k-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10,2002, pp.557-570. [13] C. Zhang, S. Bengio, M. Hardt, B. Recht, and O. Vinyals, “Understanding deep learning requires rethinking generalization,” International Conference on Learning Representations, Palais des Congrès Neptune, Toulon, France, 2017.
|