Return to Article Details Privacy Preservation in Data-Hungry Deep Learning: A Comprehensive Review of Attacks and Techniques Download Download PDF