1. [ 1 ] Y. Liu et al. , “ Trojaning attack on neural networks ,” in Proc. NDSS , 2018 , pp. 1 - 17 . [1] Y. Liu et al., “Trojaning attack on neural networks,” in Proc. NDSS, 2018, pp. 1-17.
2. [2]v B. Hitaj , G. Ateniese , and F. Perez-Cruz , “ Deep models under the GAN:Information leakage from collaborative deep learning ,” in Proc. ACM CCS , 2017 , pp. 603– 618 . [2]vB. Hitaj, G. Ateniese, and F. Perez-Cruz, “Deep models under the GAN:Information leakage from collaborative deep learning,” in Proc. ACM CCS, 2017, pp. 603–618.
3. Federated Machine Learning
4. Engineering searchable encryption of mobile cloud networks: when QoE meets QoP
5. Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds