Detecting Adversarial Data via Perturbation Forgery

Open in new window