Research Article

A Defense Framework for Privacy Risks in Remote Machine Learning Service

Figure 4

The defense performance with the different adversarial methods. (a) Without constraint conditions. (b) With constraint conditions.
(a)
(b)