Table 3.
Comparison of different adversarial attack methods.
| Attack Method | Attack Settings | Similarity Metric | Scope | Domain | Attack Objectives |
|---|---|---|---|---|---|
| FGSM17 | White-Box |
,
|
Universal | Classification | Obfuscation |
| Face Recognition19 | White-Box | Physical | Image-specific | Recognition | Impersonation |
| PGD23 | White-Box | ![]() |
Universal | Classification | Obfuscation |
| A3GN84 | White-Box | Cosine | Image-specific | Recognition | Impersonation |
| Evolutionary Optimization20 | Black-Box | – | Image-specific | Recognition | Impersonation |
| GFLM85 | White-Box | – | Image-specific | Recognition | Obfuscation |
| AdvFaces21 | Semi-White-Box | ![]() |
Image-specific | Recognition | Both |
| GAP++88 | White-Box |
, ,
|
Universal | – | Obfuscation |






