“…A wide spectrum of studies has been performed, and those include the generation of the adversarial examples [4,8,16,22,23,26,36] and crafting defense [4,10,11,21,28,34,35,42] against such synthetic attacks. Also, studying DNN models as software and utilizing SE techniques have been proven to be useful to validate and test the DNN model [2,15,17,24,27,39,40].…”