1. 1. Namiot, D., Ilyushin, E., Pilipenko, O., On Trusted AI Platforms, Int. J. Open Inform. Techn., 2022, vol. 10, no. 7, pp. 119-127.
2. 2. Kostyumov, V., A Survey and Systematization of Evasion Attacks in Computer Vision, Int. J. Open Inform. Techn., 2022, vol. 10, no. 10, pp. 11-20.
3. 3. Stoecklin, M.Ph., Jang, J., and Kirat, D., DeepLocker: How AI Can Power a Stealthy New Breed of Malware, Security Intelligence, 2018, vol. 8.
4. 4. Ilyushin, E., Namiot, D., and Chizhov, I., Attacks on Machine Learning Systems-Common Problems and Methods, Int. J. Open Inform. Techn., 2022, vol. 10, no. 3, pp. 17-22.
5. 5. Liu, T. et al., StegoNet: Turn Deep Neural Network into a Stegomalware, in Annual Computer Security Applications Conference. ACSAC'20, 2020, pp. 928-938.