Fig. 7From: Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregationRandomized transformation \(\mathbb {P}_{ji}\), 1≤j≤J, 1≤i≤I examples: a randomized sampling, b randomized permutation, and c randomized sign flipping in the sub-block defined in orange. All transforms are key-basedBack to article page