The technique demonstrated above was adapted based on the following article:
Keydana (2020, May 15). Posit AI Blog: Hacking deep learning: model inversion attack by example. Retrieved from https://blogs.rstudio.com/tensorflow/posts/2020-05-15-model-inversion-attacks/