Fig. 6From: Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregationGeneralized diagram of the proposed multi-channel system with the KDABack to article page