Review Article

A Review of Deep Learning Security and Privacy Defensive Techniques

Figure 6

Generative adversarial network.