Attacking Adversarial Attacks as A Defense

The dataset used in the paper is not explicitly described, but it is mentioned that the authors examined state-of-the-art attacks of various kinds.

BibTex: