notesum.ai
Published at December 3Underload: Defending against Latency Attacks for Object Detectors on Edge Devices
cs.CV
cs.CR
Released Date: December 3, 2024
Authors: Tianyi Wang, Zichen Wang, Cong Wang1, Yuanchao Shu, Ruilong Deng, Peng Cheng, Jiming Chen
Aff.: 1Zhejiang University, Hangzhou, China

| -norm | Attack | Standard | MTD | OOD | Underload* |
| 10 | Daedalus | 73.0 | 57.6 | 55.8 | 68.7 |
| Phantom | 72.1 | 57.7 | 55.7 | 68.7 | |
| Overload | 71.8 | 57.7 | 55.6 | 68.6 | |
| 20 | Daedalus | 70.9 | 57.5 | 55.6 | 68.4 |
| Phantom | 70.2 | 57.4 | 55.6 | 68.3 | |
| Overload | 66.1 | 57.2 | 55.5 | 68.6 | |
| 30 | Daedalus | 66.6 | 57.2 | 55.3 | 67.9 |
| Phantom | 64.2 | 57.4 | 55.8 | 67.6 | |
| Overload | 51.2 | 57.0 | 55.7 | 68.4 | |
| 50 | Daedalus | 41.1 | 55.0 | 53.5 | 62.0 |
| Phantom | 32.9 | 56.2 | 54.7 | 65.4 | |
| Overload | 17.1 | 54.0 | 54.8 | 59.3 | |
| 70 | Daedalus | 12.8 | 50.1 | 48.4 | 50.3 |
| Phantom | 7.5 | 54.7 | 53.3 | 61.3 | |
| Overload | 4.5 | 49.4 | 49.1 | 53.3 |