1. Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2014) Intriguing properties of neural networks. In: 2nd international conference on learning representations, ICLR 2014, Banff, April 14–16, 2014, conference track proceedings, http://arxiv.org/abs/1312.6199
2. Goodfellow I, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: 3rd international conference on learning representations, ICLR 2015, San Diego, May 7–9, 2015, conference track proceedings. http://arxiv.org/abs/1412.6572
3. Nguyen A, Yosinski J, Clune J (2015) Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. In: IEEE conference on computer vision and pattern recognition, CVPR 2015, Boston, June 7–12, pp 427–436. https://doi.org/10.1109/CVPR.2015.7298640
4. Chakraborty A, Alam M, Dey V, Chattopadhyay A, Mukhopadhyay D (2021) A survey on adversarial attacks and defences. CAAI Trans Intell Technol 6(1):25–45. https://doi.org/10.1049/cit2.12028
5. Wang W, Wang R, Wang L, Tang B (2019) Adversarial examples generation approach for tendency classification on chinese texts. Ruan Jian Xue Bao/J Softw 30(08):2415–2427