“…Defenses: Proposed defenses include detection and rejection methods [32,26,55,61,3,63], pre-processing, quantization and dimensionality reduction methods [12,73,7], manifold-projection methods [40,72,82,86], methods based on stochasticity/regularization or adapted architectures [109,7,68,88,35,43,76,45,51,107], ensemble methods [57,94,34,100], as well as adversarial training [109,65,36,83,90,54,62]; however, many defenses have been broken, often by considering "specialized" or novel attacks [13,15,5,6]. In [6], only adversarial training, e.g., the work by Madry et al [62], has been shown to be effective -although many recent defenses have not been studied extensively.…”