1. Lecture Notes in Computer Science;M Abdalla,2020
2. Agency, X.N.: Data security law of the people’s republic of China. https://www.gov.cn/xinwen/2021-06/11/content_5616919.htm
3. Agency, X.N.: Personal information protection law of the people’s republic of China. https://www.gov.cn/xinwen/2021-08/20/content_5632486.htm
4. Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V.: How to backdoor federated learning. In: International Conference on Artificial Intelligence and Statistics, pp. 2938–2948. PMLR (2020)
5. Blanchard, P., El Mhamdi, E.M., Guerraoui, R., Stainer, J.: Machine learning with adversaries: Byzantine tolerant gradient descent. In: Advances in Neural Information Processing Systems, vol. 30 (2017)