1. Goodfellow, I.J., Shlens, J., and Szegedy, C. (2015). Explaining and Harnessing Adversarial Examples. arXiv.
2. Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R. (2014). Intriguing properties of neural networks. arXiv.
3. IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection;Lin;Advances in Knowledge Discovery and Data Mining,2022
4. Abdoli, S., Hafemann, L.G., Rony, J., Ayed, I.B., Cardinal, P., and Koerich, A.L. (2020). Universal Adversarial Audio Perturbations. arXiv.
5. Carlini, N., and Wagner, D. (2018). Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. arXiv.