1. Turning your weakness into a strength: watermarking deep neural networks by backdooring;Adi,2018
2. Anderson H.S., Kharkar A., Filar B., Evans D., Roth P.. Learning to evade static pe machine learning malware models via reinforcement learning. 2018. arXiv:1801.08917
3. Anderson H.S., Roth P.. EMBER: An open dataset for training static PE malware machine learning models. arXiv:1804.04637
4. Attacking machine learning the cylance case study;Ashkenazy;BSides Sydney,2019
5. Ba J.L., Kiros J.R., Hinton G.E.. Layer normalization. arXiv:1607.06450