1. Bae H, Jang J, Jung D, Jang H, Ha H, Yoon S. Security and privacy issues in deep learning. arXiv:1807.11655v1, 31 Jul 2018.
2. Baluja S, Fischer I. Adversarial transformation networks: learning to generate adversarial examples. arXiv:1703.09387v1, 28 Mar 2017.
3. Berthelot D, Schumm T, Metz L. BEGAN: boundary equilibrium generative adversarial networks. arXiv:1703.10717v4, 31 May 2017.
4. Evasion attacks against machine learning at test time;Biggio,2013
5. Wild patterns: ten years after the rise of adversarial machine learning;Biggioa;Pattern Recognit,2018