Research Article

The Defense of Adversarial Example with Conditional Generative Adversarial Networks

Table 6

Comparisons with other defense methods.

AttackTarget modelNo attackNo defenseDefense-GANMagNetAdv.TrOur method

FGSMA0.9970.2170.9880.1910.6510.986
B0.9620.0220.9560.0820.0600.958
C0.9960.3310.9890.1630.7860.987
D0.9920.0380.9800.0940.7320.983

CWA0.9970.1410.9890.0380.0770.965
B0.9620.0320.9160.0340.2800.924
C0.9960.1260.9890.0250.0310.968
D0.9920.0320.9830.0210.0100.966