5 code implementations • ICLR 2019 • Robin C. Geyer, Tassilo Klein, Moin Nabi
In such an attack, a client's contribution during training and information about their data set is revealed through analyzing the distributed model.
Federated Learning Privacy Preserving