[1]
“Securing Deep Neural Networks: A Life-Cycle Perspective On Trojan Attacks And Defensive Measures”, ijaair, vol. 1, no. 01, pp. 26–31, Dec. 2024, Accessed: Jun. 27, 2025. [Online]. Available: https://aimjournals.com/index.php/ijaair/article/view/132