Fig. 10From: Machine learning security and privacy: a review of threats and countermeasuresState-of-the-art-AML attack typesBack to article page