1. Lecture Notes in Computer Science;P Kocher,1999
2. Tramèr, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: 25th $$\{$$USENIX$$\}$$ Security Symposium ($$\{$$USENIX$$\}$$ Security 16), pp. 601–618 (2016)
3. Batina, L., Bhasin, S., Jap, D., Picek, S.: $$\{$$CSI$$\}$$$$\{$$NN$$\}$$: reverse engineering of neural network architectures through electromagnetic side channel. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 515–532 (2019)
4. Chakraborty, A., Alam, M., Dey, V., Chattopadhyay, A., Mukhopadhyay, D.: Adversarial attacks and defences: a survey. CoRR abs/1810.00069 (2018). http://arxiv.org/abs/1810.00069
5. Won, Y.S., Chatterjee, S., Jap, D., Basu, A., Bhasin, S.: DeepFreeze: cold boot attacks and high fidelity model recovery on commercial EdgeML device. In: 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pp. 1–9. IEEE (2021)