Skip to main content
. 2020 Jan 14;13:112. doi: 10.3389/fnbot.2019.00112

Figure 1.

Figure 1

Per iterative computation process for preserving privacy on each learning task.