1 code implementation • 26 Oct 2023 • Fnu Suya, Anshuman Suri, Tingwei Zhang, Jingtao Hong, Yuan Tian, David Evans
However, these works make different assumptions on the adversary's knowledge and current literature lacks a cohesive organization centered around the threat model.