no code implementations • 24 Dec 2019 • Mohamed Baza, Andrew Salazar, Mohamed Mahmoud, Mohamed Abdallah, Kemal Akkaya
In this paper, we tackle this problem by sharing the models instead of the original sensitive data by using the mimic learning approach.