Review Article

A Review of Deep Learning Security and Privacy Defensive Techniques

Figure 3

Training and interface in Deep Learning.