Presentation attacks - where the sensor is the input vector.
Indirect attacks - when the attacker has access to system internals. These are closely related to typical cybersecurity measures.
Original (Trung Anh Dang, Towards Data Science)