1. Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I. and Fergus, R. (2013) Intriguing properties of neural networks. International Conference on Learning Representations.
2. Madry, A., Makelov, A., Schmidt, L., Tsipras, D. and Vladu, A. (2017) Towards deep learning models resistant to adversarial attacks. International Conference on Machine Learning.
3. Croce, F. and Hein, M. (2020) Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. International Conference on Machine Learning.
4. Deka, P.K., Bhuyan, M.H., Kadobayashi, Y. and Elmroth, E. (2019) Adversarial impact on anomaly detection in cloud datacenters. In 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC) (IEEE): 188–18809.
5. Kim, D.S. and Park, J.S. (2003) Network-based intrusion detection with support vector machines. In International Conference on Information Networking (Springer): 747–756.