Fig. 3From: Machine learning security and privacy: a review of threats and countermeasuresEvasion attack surface in ML model development process-evasion ML attackBack to article page