1. Tensorflow: a system for large-scale machine learning;Abadi,2016
2. Akavia, A., Leibovich, M., Resheff, Y. S., Ron, R., Shahar, M., Vald, M., 2021. Privacy-preserving decision trees training and prediction. Cryptology ePrint Archive, Report 2021/768, https://ia.cr/2021/768.
3. High-throughput semi-honest secure three-party computation with an honest majority;Araki,2016
4. Attrapadung, N., Hamada, K., Ikarashi, D., Kikuchi, R., Matsuda, T., Mishina, I., Morita, H., Schuldt, J. C. N., 2021. Adam in private: Secure and fast training of deep neural networks with adaptive moment estimation. Cryptology ePrint Archive, Report 2021/736, https://ia.cr/2021/736.
5. Boldyreva, A., Tang, T., 2021. Privacy-preserving approximate k-nearest-neighbors search that hides access, query and volume patterns. Cryptology ePrint Archive, Report 2021/816, https://ia.cr/2021/816.