Skip to main content

Table 1 Typical Iterative attack method

From: Defense against adversarial attacks in traffic sign images identification based on 5G

Method

I-FGSM

C&W

Deepfool

JSMA

Category

White box

White box

White box

White box

Target

Target or non-target

Target or non-target

Target or non-target

Target or non-target

Specific

Image specific

Image specific

Image specific

Image specific

Perturbation

l∞

l0, l2, l∞

l2, l∞

l0

Learning

Iterative

Iterative

Iterative

Iterative

Strength

Strong

Strong

Strong

General