Fig. 1From: Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregationThe information access diagram: the defender has an access to the training data and secret shared between the training and test stages while the attacker has only access to the shared training data setBack to article page