Fig. 1From: Machine learning security and privacy: a review of threats and countermeasuresStructure of this literature review to address research questionsBack to article page