Techniques targeting training data integrity and privacy through poisoning and inference attacks.
| | |