Related references
Note: Only part of the references are listed.A Review of Deep Learning Security and Privacy Defensive Techniques
Muhammad Imran Tariq et al.
MOBILE INFORMATION SYSTEMS (2020)
Machine Learning Security: Threats, Countermeasures, and Evaluations
Mingfu Xue et al.
IEEE ACCESS (2020)
Data Poison Detection Schemes for Distributed Machine Learning
Yijin Chen et al.
IEEE ACCESS (2020)
Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward
Adnan Qayyum et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities
Guowen Xu et al.
IEEE COMMUNICATIONS MAGAZINE (2019)
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini et al.
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)
An Attack Surface Metric
Pratyusa K. Manadhata et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2011)
Just Noticeable Difference for Images with Decomposition Model for Separating Edge and Textured Regions
Anmin Liu et al.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2010)
Image quality assessment: From error visibility to structural similarity
Z Wang et al.
IEEE TRANSACTIONS ON IMAGE PROCESSING (2004)