Skip to main content

Table 1 Typical Iterative attack method

From: Defense against adversarial attacks in traffic sign images identification based on 5G

Method I-FGSM C&W Deepfool JSMA
Category White box White box White box White box
Target Target or non-target Target or non-target Target or non-target Target or non-target
Specific Image specific Image specific Image specific Image specific
Perturbation l l0, l2, l l2, l l0
Learning Iterative Iterative Iterative Iterative
Strength Strong Strong Strong General