1. The secret sharer: Evaluating and testing unintended memorization in neural networks;carlini;arXiv 1802 08232,2018
2. BadNets: Identifying vulnerabilities in the machine learning model supply chain;gu;arXiv 1708 06733,2017
3. Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
4. Adversarial examples in the physical world;kurakin;arXiv 1607 02533,2016
5. Explaining and harnessing adversarial examples;goodfellow;arXiv 1412 6572,2014