Review Article

A Review of Deep Learning Security and Privacy Defensive Techniques

Figure 5

Structure of recurrent neural network.