no code implementations • 2 Jun 2018 • Pinlong Zhao, Zhouyu Fu, Ou wu, QinGhua Hu, Jun Wang
In contrast to existing defense methods, the proposed method does not require knowledge of the process for generating adversarial examples and can be applied to defend against different types of attacks.