Skip to main content
. 2022 May 3;24(5):643. doi: 10.3390/e24050643

Figure 5.

Figure 5

Adversary model for reconstruction attack.