1. [n. d.]. YOLOv3 implementation: darknet. https://pjreddie.com/darknet/yolo/. [n. d.]. YOLOv3 implementation: darknet. https://pjreddie.com/darknet/yolo/.
2. Lejla Batina , Shivam Bhasin , Dirmanto Jap , and Stjepan Picek . 2019. {CSI} {NN} : Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel . In 28th {USENIX} Security Symposium ({USENIX} Security 19). 515--532. Lejla Batina, Shivam Bhasin, Dirmanto Jap, and Stjepan Picek. 2019. {CSI} {NN}: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 515--532.
3. Wild patterns: Ten years after the rise of adversarial machine learning
4. Wieland Brendel , Jonas Rauber , and Matthias Bethge . 2017. Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv preprint arXiv:1712.04248 ( 2017 ). Wieland Brendel, Jonas Rauber, and Matthias Bethge. 2017. Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv preprint arXiv:1712.04248 (2017).
5. Jason Brownlee. 2019. Deep learning for computer vision: image classification object detection and face recognition in python. Machine Learning Mastery. Jason Brownlee. 2019. Deep learning for computer vision: image classification object detection and face recognition in python. Machine Learning Mastery.