no code implementations • 24 Mar 2018 • Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen
While most works in the security of machine learning has concentrated on the evasion resistance (a) problem, there is little work in the areas of reacting to attacks (b and c).