“…Both of the aforementioned outsourcing strategies come with new security concerns. In addition, the literature suggests that different types of attacks can be realized on different components of the communication network as well ( Usama et al, 2020a ), for example, intrusion detection ( Han et al, 2020 ; Usama et al, 2020b ), network traffic classification ( Usama et al, 2019 ), and malware detection systems ( Chen et al, 2018 ). Moreover, adversarial ML attacks have also been devised for client-side ML classifiers, that is, Google’s phishing pages filter ( Liang et al, 2016 ).…”