no code implementations • 28 Sep 2022 • Jože M. Rožanec, Dimitrios Papamartzivanos, Entso Veliou, Theodora Anastasiou, Jelle Keizer, Blaž Fortuna, Dunja Mladenić
We propose using a two-layered deployment of machine learning models to prevent adversarial attacks.