Graph-based methods coupled with specific distributional distances for adversarial attack detection