From: Defense against adversarial attacks in traffic sign images identification based on 5G
Method | I-FGSM | C&W | Deepfool | JSMA |
---|---|---|---|---|
Category | White box | White box | White box | White box |
Target | Target or non-target | Target or non-target | Target or non-target | Target or non-target |
Specific | Image specific | Image specific | Image specific | Image specific |
Perturbation | l∞ | l0, l2, l∞ | l2, l∞ | l0 |
Learning | Iterative | Iterative | Iterative | Iterative |
Strength | Strong | Strong | Strong | General |