3 code implementations • 2 Jan 2020 • Ying Meng, Jianhai Su, Jason O'Kane, Pooyan Jamshidi
There has been extensive research on developing defense techniques against adversarial attacks; however, they have been mainly designed for specific model families or application domains, therefore, they cannot be easily extended.