no code implementations • 28 Oct 2022 • Xuefeng Yang, Li Liu, Wenju Zhou, Jing Shi, Yinggang Zhang, Xin Hu, Huiyu Zhou
Moreover, the privacy of the system is analyzed to ensure the security of the real data.
Privacy Preserving