A Methodology for Formalizing Model-Inversion Attacks | IEEE Conference Publication | IEEE Xplore