Fig. 11From: Machine learning security and privacy: a review of threats and countermeasuresState-of-the-art of mitigation techniques-AML attack typesBack to article page