The Good, the Bad and the Ugly: Watermarks, Transferable Attacks and Adversarial Defenses

Open in new window