Watch this video on YouTube
Fill in the blank: "__________ is the process by which model inversion attacks are executed by exploiting the model's output to gain insights into the original training data."