Skip to main content
. 2022 Mar 2;22(5):1969. doi: 10.3390/s22051969

Figure 6.

Figure 6

The 6G AI/ML security architecture, and different attacks in each layer.