1. Atapoor, S., Smart, N.P., Alaoui, Y.T.: Private Liquidity Matching Using MPC. In: CT-RSA (2022)
2. Ateniese, G., Mancini, L.V., Spognardi, A., Villani, A., Vitali, D., Felici, G.: Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. Int. J. Secur, Netw (2015)
3. Canonne, C.L.: A survey on distribution testing: Your data is big. but is it blue? Theory of Computing (2020)
4. Carter, H., Mood, B., Traynor, P., Butler, K.R.B.: Outsourcing secure two-party computation as a black box. In: Secur. Commun. Networks (2015)
5. Chang, I., Sotiraki, K., Chen, W., Kantarcioglu, M., Popa, R.: HOLMES: efficient distribution testing for secure collaborative learning. In: USENIX Security (2023)