1. Stoecklin, M.P. (2018). Deeplocker: How AI Can Power a Stealthy New Breed of Malware. Secur. Intell., 8, Available online: https://securityintelligence.com/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware/.
2. Low-cohesion differential privacy protection for industrial Internet;Hou;J. Supercomput.,2020
3. Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., Dafoe, A., Scharre, P., Zeitzoff, T., and Filar, B. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv.
4. Bodeau, D., and Graubart, R. (2017). Cyber Resiliency Design Principles: Selective Use throughout the Lifecycle and in Conjunction with Related Disciplines, The MITRE Corporation.
5. Toyoshima, K., Oda, T., Hirota, M., Katayama, K., and Barolli, L. (2020, January 24–26). A DQN based mobile actor node control in WSAN: Simulation results of different distributions of events considering three-dimensional environment. Proceedings of the International Conference on Emerging Internetworking, Data & Web Technologies, Kitakyushu, Japan.