1. State-of-the-art in artificial neural network applications: a survey;Abiodun;Heliyon,2018
2. Turning your weakness into a strength: watermarking deep neural networks by backdooring;Adi,2018
3. Extraction of complex DNN models: real threat or boogeyman?;Atli,2020
4. Chen, X., Liu, C., Li, B., Lu, K., Song, D., 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526
5. Cohen, G., Afshar, S., Tapson, J., van Schaik, A., 2017. EMNIST: An extension of MNIST to handwritten letters. arXiv preprint arXiv:1702.05373