Attack as Defense: Characterizing Adversarial Examples using Robustness | Read Paper on Bytez