Skip to main content
. 2025 Aug 22;15:30861. doi: 10.1038/s41598-025-15753-8

Table 3.

Comparison of different adversarial attack methods.

Attack Method Attack Settings Similarity Metric Scope Domain Attack Objectives
FGSM17 White-Box Inline graphic, Inline graphic Universal Classification Obfuscation
Face Recognition19 White-Box Physical Image-specific Recognition Impersonation
PGD23 White-Box Inline graphic Universal Classification Obfuscation
A3GN84 White-Box Cosine Image-specific Recognition Impersonation
Evolutionary Optimization20 Black-Box Image-specific Recognition Impersonation
GFLM85 White-Box Image-specific Recognition Obfuscation
AdvFaces21 Semi-White-Box Inline graphic Image-specific Recognition Both
GAP++88 White-Box Inline graphic, Inline graphic, Inline graphic Universal Obfuscation