1. Proceedings of the meeting. J. Roy. Stat. Soc. Ser. A (Gen.) 119(2), 146–149 (1956).
http://www.jstor.org/stable/2342881
2. Adi, Y., Baum, C., Cisse, M., Pinkas, B., Keshet, J.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th USENIX Security Symposium (USENIX Security 2018), Baltimore, MD, pp. 1615–1631. USENIX Association (2018)
3. Apolloni, B., Bassis, S., Gaito, S., Malchiodi, D.: Bootstrapping complex functions. Nonlinear Anal. Hybrid Syst. 2(2), 648–664 (2008)
4. Apolloni, B., Bassis, S., Malchiodi, D., Pedrycz, W.: The Puzzle of Granular Computing. Springer, Heidelberg (2008).
https://doi.org/10.1007/978-3-540-79864-4
5. Bargiela, A., Pedrycz, W.: Granular computing. In: Handbook on Computational Intelligence. Fuzzy Logic, Systems, Artificial Neural Networks, and Learning Systems, vol. 1, pp. 43–66. World Scientific (2016)