Hacking deep learning: model inversion attack by example

You may also like...