Model Inversion Attacks: A Survey of Approaches and Countermeasures

Open in new window