Fig. 2From: Machine learning security and privacy: a review of threats and countermeasuresPoisoning attack surface in ML model development process-poisoning ML attackBack to article page