1. Turning your weakness into a strength: Watermarking deep neural networks by backdooring;Adi,2018
2. A new backdoor attack in CNNS by training set corruption without label poisoning;Barni,2019
3. Fingerprinting long forgiving messages;Blakley,1986
4. Targeted backdoor attacks on deep learning systems using data poisoning;Chen,2017
5. Hardware trojan design on neural networks;Clements,2019