1. Changliu Liu, Arnon, T., Lazarus, Ch., Strong, Ch., Barrett, C., and Kochenderfer, M.J., Algorithms for Verifying Deep Neural Networks, 2020. https://arxiv.org/pdf/1903.06758.pdf.
2. Alejandro Barredo Arrieta, Daz-Rodrguez, N., Del Ser, J., Bennetot, A., Siham Tabik, Barbado, A., Garcia, S., Gil-Lopez, S., Molina, D., Benjamins, R., Raja Chatila, and Herrera, F., Explainable Artificial Intelligence (XAI): Concepts, Taxonomies, Opportunities and Challenges toward Responsible AI. 2019. https://arxiv. org/pdf/1910.10045.pdf.
3. Nektaria Kaloudi and Jingyue Li, The AI-based cyber threat landscape: A survey, ACM Comput. Surv., 2020, vol. 53, p. 1.
4. Seymour, J. and Tully, Ph., Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter, Black Hat. USA, 2016, vol. 37, no. 2016, p. 139.
5. Dhilung Kirat, Jiyong Jang, and Stoecklin, M.Ph., DeepLocker—Concealing targeted attacks with AI Locksmithing, in Proceedings of the Black Hat USA Conference, 2018.