1. Deep learning with differential privacy;Abadi,2016
2. Human activity recognition on smartphones using a multiclass hardware-friendly support vector machine;Anguita,2012
3. Privacy preserving cyber threat information sharing and learning for cyber defense;Badsha,2019
4. The algorithmic foundations of differential privacy;Dwork;Found. Trends® Theor. Comput. Sci.,2014
5. A public key cryptosystem and a signature scheme based on discrete logarithms;ElGamal;IEEE Trans. Inf. Theory,1985