no code implementations • 17 Jun 2020 • Bartosz Wójcik, Paweł Morawiecki, Marek Śmieja, Tomasz Krzyżek, Przemysław Spurek, Jacek Tabor
We present a mechanism for detecting adversarial examples based on data representations taken from the hidden layers of the target network.