1. [1] “CoverUp Measurement Data,” http://e.mohammadi.eu/paper/coverup_measurements.zip, 2018, [Online].
2. [2] M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, “Deep Learning with Differential Privacy,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, 2016, pp. 308–318.10.1145/2976749.2978318
3. [3] M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, 1st ed. New York: Dover, 1972.
4. [4] B. Balle, G. Barthe, and M. Gaboardi, “Privacy amplification by subsampling: Tight analyses via couplings and divergences,” in Neural Information Processing Systems (NIPS), 2018.
5. [5] B. Balle and Y. Wang, “Improving the gaussian mechanism for differential privacy: Analytical calibration and optimal denoising,” in Proceedings of the 35th International Conference on Machine Learning (ICML), 2018, pp. 403–412.