1. Communication-Efficient Learning of Deep Networks from Decentralized Data;McMahan
2. The Rootkit arsenal: Escape and evasion in the dark corners of the system;Blunden
3. Layer-wise characterization of latent information leakage in federated learning;Mo
4. A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning
5. Stealing Machine Learning Models via Prediction APIs;Tramér