Label-Only Model Inversion Attacks via Knowledge Transfer Supplementary Materials

Open in new window