1. Synthesizing robust adversarial examples;Athalye,2018
2. M. Fredrikson, S. Jha, T. Ristenpart, Model inversion attacks that exploit confidence information and basic countermeasures, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 1322–1333.
3. M. Fredrikson, E. Lantz, S. Jha, S. Lin, D. Page, T. Ristenpart, Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing, in: 23rd {USENIX} Security Symposium {USENIX} Security 14, 2014, pp. 17–32.
4. A distributed trust framework for privacy-preserving machine learning;Abramson,2020
5. Models and algorithms of privacy-preserving machine learning;Zapechnikov;Bezopasnost Inf. Tehnol.,2020