1. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
2. Hyrum S Anderson , Anant Kharkar , Bobby Filar , and Phil Roth . 2017. Evading machine learning malware detection. Black Hat 2017 ( 2017 ). Hyrum S Anderson, Anant Kharkar, Bobby Filar, and Phil Roth. 2017. Evading machine learning malware detection. Black Hat 2017 (2017).
3. Hyrum S Anderson and Phil Roth . 2018. Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637 ( 2018 ). Hyrum S Anderson and Phil Roth. 2018. Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637 (2018).
4. A survey on heuristic malware detection techniques
5. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text