Fig. 3From: Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregationClassifier’s decision boundaries: a without rejection and b with rejection. Note the difference in the decision regions of trained classifiersBack to article page