Fig. 6From: Machine learning security and privacy: a review of threats and countermeasuresUnique analysis criteria-developed to examine attacks technically w.r.t attack typesBack to article page