Lecture

Threat Modeling: Adversarial Examples and Backdoors