Cited By
View all- Allami ANicewarner TGoss KKundu AJiang WLin D(2025)Oblivious and distributed firewall policies for securing firewalls from malicious attacksComputers & Security10.1016/j.cose.2024.104201150(104201)Online publication date: Mar-2025
- Liu FXie XYu YBalzarotti DXu W(2024)Scalable multi-party computation protocols for machine learning in the honest-majority settingProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699009(1939-1956)Online publication date: 14-Aug-2024
- Wang RWang XChen HDecouchant JPicek SLaoutaris NLiang K(2024)MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust ClusteringProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/37004228:3(1-41)Online publication date: 13-Dec-2024
- Show More Cited By