“…Furthermore, knowing the architecture and parameters of a network could make easier for a malicious user to attack it, for instance with adversarial attacks. Indeed, if some black-box adversarial attacks do exist [54,50,13], many of them use the knowledge of the parameters of the network, at least to compute the gradients [56,21,28,41,10,39,38,5].…”