1. Biggio, B., Corona, I., Maiorca, D., Nelson, B., Šrndić, N., Laskov, P., Giacinto, G., Roli, F.: Evasion attacks against machine learning at test time. Lecture Notes in Computer Science, 387–402 (2013) https://doi.org/10.1007/978-3-642-40994-3_25
2. Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I.J., Fergus, R.: Intriguing properties of neural networks. In: Bengio, Y., LeCun, Y. (eds.) 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14–16, 2014, Conference Track Proceedings (2014). arXiv:1312.6199
3. Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: Bengio, Y., LeCun, Y. (eds.) 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7–9, 2015, Conference Track Proceedings (2015). arXiv:1412.6572
4. Papernot, N., Mcdaniel, P., Goodfellow, I.: Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv:1605.07277 (2016)
5. Biggio, B., Nelson, B., Laskov, P.: Support vector machines under adversarial label noise. In: Hsu, C.-N., Lee, W.S. (eds.) Proceedings of the Asian Conference on Machine Learning. Proceedings of Machine Learning Research, vol. 20, pp. 97–112. PMLR, South Garden Hotels and Resorts, Taoyuan, Taiwain (2011). http://proceedings.mlr.press/v20/biggio11.html