A Survey of Model Inversion Attacks and Countermeasuresдоклад на конференции