Identifying Attack-Specific Signatures in Adversarial Examples | IEEE Conference Publication | IEEE Xplore