How To Deter Adversarial Attacks In Computer Vision Models