Detecting Adversarial Examples by Input Transformations, Defense Perturbations, and Voting | IEEE Journals & Magazine | IEEE Xplore