1. An automated measure of mdp similarity for transfer in reinforcement learning;Ammar,2014
2. Practical secure aggregation for privacy-preserving machine learning;Bonawitz,2017
3. The secret sharer: Evaluating and testing unintended memorization in neural networks;Carlini,2019
4. Model inversion attacks that exploit confidence information and basic countermeasures;Fredrikson,2015
5. Fu, C., Zhang, X., Ji, S., Chen, J., Wu, J., Guo, S., et al. (2022). Label Inference Attacks Against Vertical Federated Learning. In 31st USeNIX security symposium (USeNIX security 22) (pp. 1397–1414).