1. Namiot, D., Ilyushin, E., Pilipenko, O., On Trusted AI Platforms, Int. J. Open Inform. Techn., 2022, vol. 10, no. 7, pp. 119–127.
2. Kostyumov, V., A Survey and Systematization of Evasion Attacks in Computer Vision, Int. J. Open Inform. Techn., 2022, vol. 10, no. 10, pp. 11–20.
3. Stoecklin, M.Ph., Jang, J., and Kirat, D., DeepLocker: How AI Can Power a Stealthy New Breed of Malware, Security Intelligence, 2018, vol. 8.
4. Ilyushin, E., Namiot, D., and Chizhov, I., Attacks on Machine Learning Systems-Common Problems and Methods, Int. J. Open Inform. Techn., 2022, vol. 10, no. 3, pp. 17–22.
5. Liu, T. et al., StegoNet: Turn Deep Neural Network into a Stegomalware, in Annual Computer Security Applications Conference, ACSAC’20, 2020, pp. 928–938.