“…These are listed below with their descriptions provided in the next section. - Adversarial attacks ( Brendel et al, 2017 );
- Backdoor attacks 6 ( Chen et al, 2017 ; Gu et al, 2019 );
- Cyber kill chain–based attack ( Nguyen, 2017 );
- Data manipulation attacks ( Liao et al, 2018 );
- Evasion attacks ( Hitaj et al, 2019 );
- Exploration attacks ( Sethi and Kantardzic, 2018 );
- Model extraction attacks ( Correia-Silva et al, 2018 ; Kesarwani et al, 2018 ; Joshi and Tammana, 2019 ; Reith et al, 2019 );
- Model inversion attacks ( Yang et al, 2019 );
- Model-reuse attacks ( Ji et al, 2018 );
- Trojan attacks ( Liu et al, 2018 ).
…”