[1]
E. L. Thompson, K. Schneider, and A. Petrov, “A Comprehensive Review of Graph-Regularized Robustness for Authentication Neural Systems: Security Models, Optimization Techniques, and Emerging Computing Applications”, Int Journal Adv Comp Theory Engg, vol. 14, no. 2, pp. 90–98, Oct. 2025.