Cited By
View all- Wang CPujol DNayak KMachanavajjhala ACalandrino JTroncoso C(2023)Private proof-of-stake blockchains using differentially-private stake distortionProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620326(1577-1594)Online publication date: 9-Aug-2023
- Wei CZhao MZhang ZChen MMeng WLiu BFan YChen WMeng WJensen CCremers CKirda E(2023)DPMLBench: Holistic Evaluation of Differentially Private Machine LearningProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616593(2621-2635)Online publication date: 15-Nov-2023
- Azamuke DKatarahweire MBainomugisha E(2022)Scenario-based Synthetic Dataset Generation for Mobile Money TransactionsProceedings of the Federated Africa and Middle East Conference on Software Engineering10.1145/3531056.3542774(64-72)Online publication date: 7-Jun-2022
- Show More Cited By