1. Giovanni Apruzzese, Hyrum S Anderson, Savino Dambra, David Freeman, Fabio Pierazzi, and Kevin Alejandro Roundy. 2022. Position:"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice. In First IEEE Conference on Secure and Trustworthy Machine Learning.
2. Abraham O Baquero, AJ Kornecki, and Janusz Zalewski. 2015. Threat modeling for aviation computer security. crosstalk 28, 6 (2015), 21--27.
3. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
4. Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). http://arxiv.org/abs/1412.6572
5. A Model for Technology Transfer in Practice