1. Conditional generative adversarial nets;mirza;ArXiv Preprint,2014
2. Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
3. Back-propagation applied to hand- written zip code recognition;yann;Neural Computation,1989
4. Adam: A method for stochastic optimization;kingma;In 3rd International Conference on Learning Representations ICLR 2015,2015
5. Clean-label back- door attacks on video recognition models;zhao;Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition,0