1. Blum, A. (2007). Machine learning theory. Carnegie Melon University, School of Computer Science.
2. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy;N.Dowlin;Proceedings of the 33 rd International Conference on Machine Learning,2016
3. Ferguson, N. (2010). Cryptography engineering: Design principles and practical applications.
4. Establishing the rules for building trustworthy AI
5. Domain-Adversarial Training of Neural Networks.;Y.Ganin,2015