1 code implementation • 28 Mar 2018 • Uri Shaham, James Garritano, Yutaro Yamada, Ethan Weinberger, Alex Cloninger, Xiuyuan Cheng, Kelly Stanton, Yuval Kluger
We study the effectiveness of various approaches that defend against adversarial attacks on deep networks via manipulations based on basis function representations of images.