Fig. 10From: Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregationExamples of original images from each class from MNIST (top line), Fashion-MNIST (middle line), and CIFAR-10 (bottom line) data setsBack to article page