no code implementations • 8 Dec 2023 • Florine W. Dekker, Zekeriya Erkin, Mauro Conti
Specifically, we show that reconstruction requires a number of adversaries linear in the length of the network's shortest cycle.
Federated Learning Privacy Preserving