Fig. 3From: A secure data interaction method based on edge computingIllustration of Ensemble-model Adversarial Detection Method (EADM)Back to article page