The Art of Defense: Letting Networks Fool the Attacker