1. [1] J. Schmidhuber, “Deep learning in neural networks: An overview,” Neural Networks, vol.61, pp.85-117, 2015. 10.1016/j.neunet.2014.09.003
2. [2] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, “Intriguing properties of neural networks,” International Conference on Learning Representations, 2014.
3. [3] B. Biggio, B. Nelson, and P. Laskov, “Poisoning attacks against support vector machines,” Proc. 29th International Conference on Machine Learning, pp.1467-1474, 2012.
4. [4] T. Gu, B. Dolan-Gavitt, and S. Garg, “Badnets: Identifying vulnerabilities in the machine learning model supply chain,” arXiv preprint arXiv:1708.06733, 2017.
5. [5] C. Yang, Q. Wu, H. Li, and Y. Chen, “Generative poisoning attack method against neural networks,” arXiv preprint arXiv:1703.01340, 2017.