Fig. 6
From: Defense against adversarial attacks in traffic sign images identification based on 5G

The pipeline of our defense model (this figure shows the perturbed “stop sign” image uploads to the MEC node and processed by singular value decomposition. Then the MEC node sends the correct decision to the corresponding driverless car and helps it execute the right instruction)