Advances, Systems and Applications
From: A secure data interaction method based on edge computing
Attack | Inc-v3 | VGG16 | Res50 | Inc-v4 | IncRes-v2 | Adversarial Examples | Same Predictions | Different Predictions |
---|---|---|---|---|---|---|---|---|
SIM | \(\checkmark\) | \(\checkmark\) | Â | Â | Â | 516 | 131 | 385 |
\(\checkmark\) | Â | \(\checkmark\) | Â | Â | 490 | 148 | 342 | |
\(\checkmark\) | Â | Â | \(\checkmark\) | Â | 447 | 154 | 293 | |
\(\checkmark\) | Â | Â | Â | \(\checkmark\) | 413 | 144 | 269 | |
 | \(\checkmark\) | \(\checkmark\) |  |  | 620 | 183 | 437 | |
 | \(\checkmark\) |  | \(\checkmark\) |  | 493 | 120 | 373 | |
 | \(\checkmark\) |  |  | \(\checkmark\) | 457 | 110 | 347 | |
 |  | \(\checkmark\) | \(\checkmark\) |  | 465 | 135 | 330 | |
 |  | \(\checkmark\) |  | \(\checkmark\) | 434 | 132 | 302 | |
 |  |  | \(\checkmark\) | \(\checkmark\) | 411 | 148 | 263 | |
Admix | \(\checkmark\) | \(\checkmark\) | Â | Â | Â | 588 | 136 | 452 |
\(\checkmark\) | Â | \(\checkmark\) | Â | Â | 548 | 162 | 386 | |
\(\checkmark\) | Â | Â | \(\checkmark\) | Â | 492 | 150 | 342 | |
\(\checkmark\) | Â | Â | Â | \(\checkmark\) | 460 | 163 | 297 | |
 | \(\checkmark\) | \(\checkmark\) |  |  | 677 | 196 | 481 | |
 | \(\checkmark\) |  | \(\checkmark\) |  | 553 | 125 | 428 | |
 | \(\checkmark\) |  |  | \(\checkmark\) | 496 | 93 | 403 | |
 |  | \(\checkmark\) | \(\checkmark\) |  | 519 | 143 | 376 | |
 |  | \(\checkmark\) |  | \(\checkmark\) | 477 | 138 | 339 | |
 |  |  | \(\checkmark\) | \(\checkmark\) | 450 | 156 | 294 |