1. A little is enough: circumventing defenses for distributed learning;Baruch,2019
2. Keying Hash Functions for Message Authentication;Bellare,1996
3. Machine learning with adversaries: byzantine tolerant gradient descent;Blanchard,2017
4. Practical secure aggregation for privacy-preserving machine learning;Bonawitz,2017
5. Trust assessment in vehicular social network based on three-valued subjective logic;Cheng;IEEE Trans. Multimed.,2019